Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-16232 (GCVE-0-2019-16232)
Vulnerability from cvelistv5
Published
2019-09-11 15:30
Modified
2024-08-05 01:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:10:41.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lkml.org/lkml/2019/9/9/487" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" }, { "name": "openSUSE-SU-2019:2392", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" }, { "name": "openSUSE-SU-2019:2444", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" }, { "name": "FEDORA-2019-b86a7bdba0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/" }, { "name": "FEDORA-2019-124a241044", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/" }, { "name": "USN-4285-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4285-1/" }, { "name": "USN-4287-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4287-1/" }, { "name": "USN-4287-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4287-2/" }, { "name": "USN-4284-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4284-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-02T20:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lkml.org/lkml/2019/9/9/487" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" }, { "name": "openSUSE-SU-2019:2392", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" }, { "name": "openSUSE-SU-2019:2444", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" }, { "name": "FEDORA-2019-b86a7bdba0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/" }, { "name": "FEDORA-2019-124a241044", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/" }, { "name": "USN-4285-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4285-1/" }, { "name": "USN-4287-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4287-1/" }, { "name": "USN-4287-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4287-2/" }, { "name": "USN-4284-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4284-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16232", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://lkml.org/lkml/2019/9/9/487", "refsource": "MISC", "url": "https://lkml.org/lkml/2019/9/9/487" }, { "name": "https://security.netapp.com/advisory/ntap-20191004-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20191004-0001/" }, { "name": "openSUSE-SU-2019:2392", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" }, { "name": "openSUSE-SU-2019:2444", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" }, { "name": "FEDORA-2019-b86a7bdba0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/" }, { "name": "FEDORA-2019-124a241044", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/" }, { "name": "USN-4285-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4285-1/" }, { "name": "USN-4287-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4287-1/" }, { "name": "USN-4287-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4287-2/" }, { "name": "USN-4284-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4284-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16232", "datePublished": "2019-09-11T15:30:13", "dateReserved": "2019-09-11T00:00:00", "dateUpdated": "2024-08-05T01:10:41.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-16232\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-09-11T16:15:11.457\",\"lastModified\":\"2024-11-21T04:30:20.023\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.\"},{\"lang\":\"es\",\"value\":\"El archivo drivers/net/wireless/marvell/libertas/if_sdio.c en el kernel de Linux versi\u00f3n 5.2.14, no comprueba el valor de retorno en alloc_workqueue, conllevando a una desreferencia del puntero NULL.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C324614A-D986-40EF-A933-4CD401A10B30\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lkml.org/lkml/2019/9/9/487\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20191004-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4284-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4285-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4287-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4287-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lkml.org/lkml/2019/9/9/487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20191004-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4284-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4285-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4287-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4287-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
opensuse-su-2019:2444-1
Vulnerability from csaf_opensuse
Published
2019-11-05 17:28
Modified
2019-11-05 17:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-16995: A memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c. if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).
- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).
- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).
- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).
- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).
- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- ACPI / CPPC: do not require the _PSD method (bsc#1051510).
- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).
- Add kernel module compression support (bsc#1135854)
- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).
- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).
- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).
- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).
- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- ALSA: hda: Flush interrupts on disabling (bsc#1051510).
- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).
- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).
- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- ALSA: hda - Inform too slow responses (bsc#1051510).
- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).
- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).
- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).
- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).
- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).
- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).
- ALSA: usb-audio: fix PCM device order (bsc#1051510).
- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).
- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).
- ALSA: usb-audio: remove some dead code (bsc#1051510).
- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).
- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).
- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).
- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).
- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).
- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).
- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).
- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).
- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).
- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- Blacklist 'signal: Correct namespace fixups of si_pid and si_uid' (bsc#1142667)
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).
- bpf: fix use after free in prog symbol exposure (bsc#1083647).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: af_alg - consolidation of duplicate code (bsc#1154737).
- crypto: af_alg - fix race accessing cipher request (bsc#1154737).
- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).
- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).
- crypto: af_alg - remove locking in async callback (bsc#1154737).
- crypto: af_alg - update correct dst SGL entry (bsc#1051510).
- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).
- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).
- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).
- crypto: algif_aead - overhaul memory management (bsc#1154737).
- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).
- crypto: algif - return error code when no data was processed (bsc#1154737).
- crypto: algif_skcipher - overhaul memory management (bsc#1154737).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: do not dma memory off of the stack (bsc#1152790).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- dasd_fba: Display '00000000' for zero page when dumping sense
- /dev/mem: Bail out upon SIGKILL (git-fixes).
- drm: add __user attribute to ptr_to_compat() (bsc#1111666).
- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).
- drm/amd/display: reprogram VM config when system resume (bsc#1111666).
- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)
- drm/amd/display: support spdif (bsc#1111666).
- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).
- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).
- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/atomic_helper: Allow DPMS On<->Off changes for unregistered connectors (bsc#1111666).
- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).
- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).
- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).
- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)
- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).
- drm/mediatek: set DMA max segment size (bsc#1111666).
- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).
- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)
- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).
- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).
- drm/panel: check failure cases in the probe func (bsc#1111666).
- drm/panel: make drm_panel.h self-contained (bsc#1111666).
- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).
- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).
- drm/stm: attach gem fence to atomic state (bsc#1111666).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).
- efi: cper: print AER info of PCIe fatal error (bsc#1051510).
- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).
- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- Fix AMD IOMMU kABI (bsc#1154610).
- Fix KVM kABI after x86 mmu backports (bsc#1117665).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- HID: apple: Fix stuck function keys when using FN (bsc#1051510).
- HID: fix error message in hid_open_report() (bsc#1051510).
- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).
- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).
- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hso: fix NULL-deref on tty open (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: ca8210: prevent memory leak (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).
- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).
- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kABI workaround for crypto/af_alg changes (bsc#1154737).
- kABI workaround for drm_connector.registered type changes (bsc#1111666).
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354).
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).
- lpfc: Add additional discovery log messages (bsc#1154521).
- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).
- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).
- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).
- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).
- lpfc: fix coverity error of dereference after null check (bsc#1154521).
- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).
- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).
- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).
- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).
- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).
- lpfc: Make FW logging dynamically configurable (bsc#1154521).
- lpfc: Remove lock contention target write path (bsc#1154521).
- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).
- lpfc: Slight fast-path Performance optimizations (bsc#1154521).
- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- mac80211: fix txq null pointer dereference (bsc#1051510).
- mac80211: Reject malformed SSID elements (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).
- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).
- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).
- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).
- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).
- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).
- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).
- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net_sched: add policy validation for action attributes (networking-stable-19_09_30).
- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix null pointer dereference (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).
- packaging: add support for riscv64
- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).
- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- PCI: PM: Fix pci_power_up() (bsc#1051510).
- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).
- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- powerplay: Respect units on max dcfclk watermark (bsc#1111666).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).
- r8152: Set macpassthru in reset_resume callback (bsc#1051510).
- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- RDMA: Fix goto target to release the allocated memory (bsc#1050244).
- rds: Fix warning (bsc#1154848).
- Revert 'drm/amd/display: Fix underscan not using proper scaling' (bsc#1111666).
- Revert 'drm/amd/powerplay: Enable/Disable NBPSTATE on On/OFF of UVD' (bsc#1111666).
- Revert 'drm/radeon: Fix EEH during kexec' (bsc#1051510).
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).
- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).
- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).
- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).
- scsi: lpfc: Check queue pointer before use (bsc#1154242).
- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).
- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).
- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).
- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).
- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).
- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).
- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).
- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).
- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).
- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).
- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).
- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).
- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).
- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).
- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).
- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).
- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).
- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).
- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).
- scsi: lpfc: Update async event logging (bsc#1154521).
- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- Sign non-x86 kernels when possible (boo#1134303)
- skge: fix checksum byte order (networking-stable-19_09_30).
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: ldusb: fix memleak on disconnect (bsc#1051510).
- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).
- usb: ldusb: fix read info leaks (bsc#1051510).
- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix memleak on disconnect (bsc#1051510).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).
- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usblp: fix use-after-free on disconnect (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).
- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames
openSUSE-2019-2444
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-16995: A memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c. if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).\n- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).\n- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).\n- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).\n- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).\n- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).\n- Add kernel module compression support (bsc#1135854)\n- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- ALSA: usb-audio: fix PCM device order (bsc#1051510).\n- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).\n- ALSA: usb-audio: remove some dead code (bsc#1051510).\n- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).\n- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- Blacklist \u0027signal: Correct namespace fixups of si_pid and si_uid\u0027 (bsc#1142667)\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense\n- /dev/mem: Bail out upon SIGKILL (git-fixes).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On\u003c-\u003eOff changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix KVM kABI after x86 mmu backports (bsc#1117665).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354).\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- Revert \u0027drm/amd/display: Fix underscan not using proper scaling\u0027 (bsc#1111666).\n- Revert \u0027drm/amd/powerplay: Enable/Disable NBPSTATE on On/OFF of UVD\u0027 (bsc#1111666).\n- Revert \u0027drm/radeon: Fix EEH during kexec\u0027 (bsc#1051510).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- Sign non-x86 kernels when possible (boo#1134303)\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2444", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2444-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2444-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2444-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1082635", "url": "https://bugzilla.suse.com/1082635" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098291", "url": "https://bugzilla.suse.com/1098291" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113994", "url": "https://bugzilla.suse.com/1113994" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1123034", "url": "https://bugzilla.suse.com/1123034" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1133140", "url": "https://bugzilla.suse.com/1133140" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135854", "url": "https://bugzilla.suse.com/1135854" }, { "category": "self", "summary": "SUSE Bug 1135873", "url": "https://bugzilla.suse.com/1135873" }, { "category": "self", "summary": "SUSE Bug 1137040", "url": "https://bugzilla.suse.com/1137040" }, { "category": "self", "summary": "SUSE Bug 1137799", "url": "https://bugzilla.suse.com/1137799" }, { "category": "self", "summary": "SUSE Bug 1137861", "url": "https://bugzilla.suse.com/1137861" }, { "category": "self", "summary": "SUSE Bug 1140729", "url": "https://bugzilla.suse.com/1140729" }, { "category": "self", "summary": "SUSE Bug 1140845", "url": "https://bugzilla.suse.com/1140845" }, { "category": "self", "summary": "SUSE Bug 1140883", "url": "https://bugzilla.suse.com/1140883" }, { "category": "self", "summary": "SUSE Bug 1141600", "url": "https://bugzilla.suse.com/1141600" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142667", "url": "https://bugzilla.suse.com/1142667" }, { "category": "self", "summary": "SUSE Bug 1143706", "url": "https://bugzilla.suse.com/1143706" }, { "category": "self", "summary": "SUSE Bug 1144338", "url": "https://bugzilla.suse.com/1144338" }, { "category": "self", "summary": "SUSE Bug 1144375", "url": "https://bugzilla.suse.com/1144375" }, { "category": "self", "summary": "SUSE Bug 1144449", "url": "https://bugzilla.suse.com/1144449" }, { "category": "self", "summary": "SUSE Bug 1145099", "url": "https://bugzilla.suse.com/1145099" }, { "category": "self", "summary": "SUSE Bug 1146612", "url": "https://bugzilla.suse.com/1146612" }, { "category": "self", "summary": "SUSE Bug 1148410", "url": "https://bugzilla.suse.com/1148410" }, { "category": "self", "summary": "SUSE Bug 1149853", "url": "https://bugzilla.suse.com/1149853" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150457", "url": "https://bugzilla.suse.com/1150457" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150875", "url": "https://bugzilla.suse.com/1150875" }, { "category": "self", "summary": "SUSE Bug 1151508", "url": "https://bugzilla.suse.com/1151508" }, { "category": "self", "summary": "SUSE Bug 1151807", "url": "https://bugzilla.suse.com/1151807" }, { "category": "self", "summary": "SUSE Bug 1152033", "url": "https://bugzilla.suse.com/1152033" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1152685", "url": "https://bugzilla.suse.com/1152685" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1152790", "url": "https://bugzilla.suse.com/1152790" }, { "category": "self", "summary": "SUSE Bug 1152791", "url": "https://bugzilla.suse.com/1152791" }, { "category": "self", "summary": "SUSE Bug 1153112", "url": "https://bugzilla.suse.com/1153112" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153236", "url": "https://bugzilla.suse.com/1153236" }, { "category": "self", "summary": "SUSE Bug 1153263", "url": "https://bugzilla.suse.com/1153263" }, { "category": "self", "summary": "SUSE Bug 1153476", "url": "https://bugzilla.suse.com/1153476" }, { "category": "self", "summary": "SUSE Bug 1153509", "url": "https://bugzilla.suse.com/1153509" }, { "category": "self", "summary": "SUSE Bug 1153607", "url": "https://bugzilla.suse.com/1153607" }, { "category": "self", "summary": "SUSE Bug 1153646", "url": "https://bugzilla.suse.com/1153646" }, { "category": "self", "summary": "SUSE Bug 1153713", "url": "https://bugzilla.suse.com/1153713" }, { "category": "self", "summary": "SUSE Bug 1153717", "url": "https://bugzilla.suse.com/1153717" }, { "category": "self", "summary": "SUSE Bug 1153718", "url": "https://bugzilla.suse.com/1153718" }, { "category": "self", "summary": "SUSE Bug 1153719", "url": "https://bugzilla.suse.com/1153719" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1153969", "url": "https://bugzilla.suse.com/1153969" }, { "category": "self", "summary": "SUSE Bug 1154108", "url": "https://bugzilla.suse.com/1154108" }, { "category": "self", "summary": "SUSE Bug 1154189", "url": "https://bugzilla.suse.com/1154189" }, { "category": "self", "summary": "SUSE Bug 1154242", "url": "https://bugzilla.suse.com/1154242" }, { "category": "self", "summary": "SUSE Bug 1154268", "url": "https://bugzilla.suse.com/1154268" }, { "category": "self", "summary": "SUSE Bug 1154354", "url": "https://bugzilla.suse.com/1154354" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1154521", "url": "https://bugzilla.suse.com/1154521" }, { "category": "self", "summary": "SUSE Bug 1154578", "url": "https://bugzilla.suse.com/1154578" }, { "category": "self", "summary": "SUSE Bug 1154607", "url": "https://bugzilla.suse.com/1154607" }, { "category": "self", "summary": "SUSE Bug 1154608", "url": "https://bugzilla.suse.com/1154608" }, { "category": "self", "summary": "SUSE Bug 1154610", "url": "https://bugzilla.suse.com/1154610" }, { "category": "self", "summary": "SUSE Bug 1154611", "url": "https://bugzilla.suse.com/1154611" }, { "category": "self", "summary": "SUSE Bug 1154651", "url": "https://bugzilla.suse.com/1154651" }, { "category": "self", "summary": "SUSE Bug 1154737", "url": "https://bugzilla.suse.com/1154737" }, { "category": "self", "summary": "SUSE Bug 1154747", "url": "https://bugzilla.suse.com/1154747" }, { "category": "self", "summary": "SUSE Bug 1154848", "url": "https://bugzilla.suse.com/1154848" }, { "category": "self", "summary": "SUSE Bug 1155178", "url": "https://bugzilla.suse.com/1155178" }, { "category": "self", "summary": "SUSE Bug 1155179", "url": "https://bugzilla.suse.com/1155179" }, { "category": "self", "summary": "SUSE Bug 1155184", "url": "https://bugzilla.suse.com/1155184" }, { "category": "self", "summary": "SUSE Bug 1155186", "url": "https://bugzilla.suse.com/1155186" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16233 page", "url": "https://www.suse.com/security/cve/CVE-2019-16233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16995 page", "url": "https://www.suse.com/security/cve/CVE-2019-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-11-05T17:28:40Z", "generator": { "date": "2019-11-05T17:28:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2444-1", "initial_release_date": "2019-11-05T17:28:40Z", "revision_history": [ { "date": "2019-11-05T17:28:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.25.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16233" } ], "notes": [ { "category": "general", "text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16233", "url": "https://www.suse.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "SUSE Bug 1150457 for CVE-2019-16233", "url": "https://bugzilla.suse.com/1150457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "low" } ], "title": "CVE-2019-16233" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16995" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16995", "url": "https://www.suse.com/security/cve/CVE-2019-16995" }, { "category": "external", "summary": "SUSE Bug 1152685 for CVE-2019-16995", "url": "https://bugzilla.suse.com/1152685" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "moderate" } ], "title": "CVE-2019-16995" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.25.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.25.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-05T17:28:40Z", "details": "moderate" } ], "title": "CVE-2019-17666" } ] }
opensuse-su-2024:10728-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-5.14.6-1.4 on GA media
Notes
Title of the patch
kernel-devel-5.14.6-1.4 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-5.14.6-1.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10728", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" } ], "title": "kernel-devel-5.14.6-1.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10728-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.aarch64", "product": { "name": "kernel-devel-5.14.6-1.4.aarch64", "product_id": "kernel-devel-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.aarch64", "product": { "name": "kernel-macros-5.14.6-1.4.aarch64", "product_id": "kernel-macros-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-5.14.6-1.4.aarch64", "product_id": "kernel-source-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product_id": "kernel-source-vanilla-5.14.6-1.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.ppc64le", "product": { "name": "kernel-devel-5.14.6-1.4.ppc64le", "product_id": "kernel-devel-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.ppc64le", "product": { "name": "kernel-macros-5.14.6-1.4.ppc64le", "product_id": "kernel-macros-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-5.14.6-1.4.ppc64le", "product_id": "kernel-source-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product_id": "kernel-source-vanilla-5.14.6-1.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.s390x", "product": { "name": "kernel-devel-5.14.6-1.4.s390x", "product_id": "kernel-devel-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.s390x", "product": { "name": "kernel-macros-5.14.6-1.4.s390x", "product_id": "kernel-macros-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.s390x", "product": { "name": "kernel-source-5.14.6-1.4.s390x", "product_id": "kernel-source-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product_id": "kernel-source-vanilla-5.14.6-1.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.x86_64", "product": { "name": "kernel-devel-5.14.6-1.4.x86_64", "product_id": "kernel-devel-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.x86_64", "product": { "name": "kernel-macros-5.14.6-1.4.x86_64", "product_id": "kernel-macros-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-5.14.6-1.4.x86_64", "product_id": "kernel-source-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product_id": "kernel-source-vanilla-5.14.6-1.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64" }, "product_reference": "kernel-devel-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-devel-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x" }, "product_reference": "kernel-devel-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64" }, "product_reference": "kernel-devel-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64" }, "product_reference": "kernel-macros-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-macros-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x" }, "product_reference": "kernel-macros-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64" }, "product_reference": "kernel-macros-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" } ] }
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-longterm-6.6.17-1.1 on GA media
Notes
Title of the patch
kernel-devel-longterm-6.6.17-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-longterm-6.6.17-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3695 page", "url": "https://www.suse.com/security/cve/CVE-2016-3695/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3542 page", "url": "https://www.suse.com/security/cve/CVE-2021-3542/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43976 page", "url": "https://www.suse.com/security/cve/CVE-2021-43976/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0185 page", "url": "https://www.suse.com/security/cve/CVE-2022-0185/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0330 page", "url": "https://www.suse.com/security/cve/CVE-2022-0330/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0886 page", "url": "https://www.suse.com/security/cve/CVE-2022-0886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1462 page", "url": "https://www.suse.com/security/cve/CVE-2022-1462/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1516 page", "url": "https://www.suse.com/security/cve/CVE-2022-1516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1852 page", "url": "https://www.suse.com/security/cve/CVE-2022-1852/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1966 page", "url": "https://www.suse.com/security/cve/CVE-2022-1966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1972 page", "url": "https://www.suse.com/security/cve/CVE-2022-1972/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1973 page", "url": "https://www.suse.com/security/cve/CVE-2022-1973/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-22942 page", "url": "https://www.suse.com/security/cve/CVE-2022-22942/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2308 page", "url": "https://www.suse.com/security/cve/CVE-2022-2308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2588 page", "url": "https://www.suse.com/security/cve/CVE-2022-2588/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2590 page", "url": "https://www.suse.com/security/cve/CVE-2022-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28893 page", "url": "https://www.suse.com/security/cve/CVE-2022-28893/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29968 page", "url": "https://www.suse.com/security/cve/CVE-2022-29968/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3424 page", "url": "https://www.suse.com/security/cve/CVE-2022-3424/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3628 page", "url": "https://www.suse.com/security/cve/CVE-2022-3628/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3640 page", "url": "https://www.suse.com/security/cve/CVE-2022-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41218 page", "url": "https://www.suse.com/security/cve/CVE-2022-41218/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41674 page", "url": "https://www.suse.com/security/cve/CVE-2022-41674/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42719 page", "url": "https://www.suse.com/security/cve/CVE-2022-42719/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42720 page", "url": "https://www.suse.com/security/cve/CVE-2022-42720/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42721 page", "url": "https://www.suse.com/security/cve/CVE-2022-42721/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42722 page", "url": "https://www.suse.com/security/cve/CVE-2022-42722/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4379 page", "url": "https://www.suse.com/security/cve/CVE-2022-4379/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44032 page", "url": "https://www.suse.com/security/cve/CVE-2022-44032/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44033 page", "url": "https://www.suse.com/security/cve/CVE-2022-44033/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44034 page", "url": "https://www.suse.com/security/cve/CVE-2022-44034/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45884 page", "url": "https://www.suse.com/security/cve/CVE-2022-45884/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45885 page", "url": "https://www.suse.com/security/cve/CVE-2022-45885/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45886 page", "url": "https://www.suse.com/security/cve/CVE-2022-45886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45887 page", "url": "https://www.suse.com/security/cve/CVE-2022-45887/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45888 page", "url": "https://www.suse.com/security/cve/CVE-2022-45888/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45919 page", "url": "https://www.suse.com/security/cve/CVE-2022-45919/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45934 page", "url": "https://www.suse.com/security/cve/CVE-2022-45934/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0045 page", "url": "https://www.suse.com/security/cve/CVE-2023-0045/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1078 page", "url": "https://www.suse.com/security/cve/CVE-2023-1078/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1192 page", "url": "https://www.suse.com/security/cve/CVE-2023-1192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1380 page", "url": "https://www.suse.com/security/cve/CVE-2023-1380/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20569 page", "url": "https://www.suse.com/security/cve/CVE-2023-20569/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2124 page", "url": "https://www.suse.com/security/cve/CVE-2023-2124/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31084 page", "url": "https://www.suse.com/security/cve/CVE-2023-31084/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3141 page", "url": "https://www.suse.com/security/cve/CVE-2023-3141/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3269 page", "url": "https://www.suse.com/security/cve/CVE-2023-3269/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39192 page", "url": "https://www.suse.com/security/cve/CVE-2023-39192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39193 page", "url": "https://www.suse.com/security/cve/CVE-2023-39193/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4128 page", "url": "https://www.suse.com/security/cve/CVE-2023-4128/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4134 page", "url": "https://www.suse.com/security/cve/CVE-2023-4134/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4194 page", "url": "https://www.suse.com/security/cve/CVE-2023-4194/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42753 page", "url": "https://www.suse.com/security/cve/CVE-2023-42753/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42754 page", "url": "https://www.suse.com/security/cve/CVE-2023-42754/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42756 page", "url": "https://www.suse.com/security/cve/CVE-2023-42756/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4623 page", "url": "https://www.suse.com/security/cve/CVE-2023-4623/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46813 page", "url": "https://www.suse.com/security/cve/CVE-2023-46813/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4881 page", "url": "https://www.suse.com/security/cve/CVE-2023-4881/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-5345 page", "url": "https://www.suse.com/security/cve/CVE-2023-5345/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6606 page", "url": "https://www.suse.com/security/cve/CVE-2023-6606/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6610 page", "url": "https://www.suse.com/security/cve/CVE-2023-6610/" } ], "title": "kernel-devel-longterm-6.6.17-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13704-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-source-longterm-6.6.17-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product_id": "kernel-devel-longterm-6.6.17-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product_id": "kernel-source-longterm-6.6.17-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-source-longterm-6.6.17-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3695" } ], "notes": [ { "category": "general", "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3695", "url": "https://www.suse.com/security/cve/CVE-2016-3695" }, { "category": "external", "summary": "SUSE Bug 1023051 for CVE-2016-3695", "url": "https://bugzilla.suse.com/1023051" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3695" }, { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3542" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3542", "url": "https://www.suse.com/security/cve/CVE-2021-3542" }, { "category": "external", "summary": "SUSE Bug 1184673 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1184673" }, { "category": "external", "summary": "SUSE Bug 1186063 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1186063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3542" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" }, { "cve": "CVE-2021-43976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43976" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43976", "url": "https://www.suse.com/security/cve/CVE-2021-43976" }, { "category": "external", "summary": "SUSE Bug 1192847 for CVE-2021-43976", "url": "https://bugzilla.suse.com/1192847" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-43976" }, { "cve": "CVE-2022-0185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0185" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0185", "url": "https://www.suse.com/security/cve/CVE-2022-0185" }, { "category": "external", "summary": "SUSE Bug 1194517 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194517" }, { "category": "external", "summary": "SUSE Bug 1194737 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194737" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0330" } ], "notes": [ { "category": "general", "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0330", "url": "https://www.suse.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "SUSE Bug 1194880 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1194880" }, { "category": "external", "summary": "SUSE Bug 1195950 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1195950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-0330" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0886" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0886", "url": "https://www.suse.com/security/cve/CVE-2022-0886" }, { "category": "external", "summary": "SUSE Bug 1197131 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197131" }, { "category": "external", "summary": "SUSE Bug 1197133 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197133" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0886" }, { "cve": "CVE-2022-1462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1462" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1462", "url": "https://www.suse.com/security/cve/CVE-2022-1462" }, { "category": "external", "summary": "SUSE Bug 1198829 for CVE-2022-1462", "url": "https://bugzilla.suse.com/1198829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1516" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1516", "url": "https://www.suse.com/security/cve/CVE-2022-1516" }, { "category": "external", "summary": "SUSE Bug 1199012 for CVE-2022-1516", "url": "https://bugzilla.suse.com/1199012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1516" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1852" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1852", "url": "https://www.suse.com/security/cve/CVE-2022-1852" }, { "category": "external", "summary": "SUSE Bug 1199875 for CVE-2022-1852", "url": "https://bugzilla.suse.com/1199875" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1966" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1966", "url": "https://www.suse.com/security/cve/CVE-2022-1966" }, { "category": "external", "summary": "SUSE Bug 1200015 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200015" }, { "category": "external", "summary": "SUSE Bug 1200268 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200268" }, { "category": "external", "summary": "SUSE Bug 1200494 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200494" }, { "category": "external", "summary": "SUSE Bug 1200529 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200529" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1966" }, { "cve": "CVE-2022-1972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1972" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1972", "url": "https://www.suse.com/security/cve/CVE-2022-1972" }, { "category": "external", "summary": "SUSE Bug 1200019 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200019" }, { "category": "external", "summary": "SUSE Bug 1200266 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200266" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1972" }, { "cve": "CVE-2022-1973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1973" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1973", "url": "https://www.suse.com/security/cve/CVE-2022-1973" }, { "category": "external", "summary": "SUSE Bug 1200023 for CVE-2022-1973", "url": "https://bugzilla.suse.com/1200023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1973" }, { "cve": "CVE-2022-22942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-22942" } ], "notes": [ { "category": "general", "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-22942", "url": "https://www.suse.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "SUSE Bug 1195065 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195065" }, { "category": "external", "summary": "SUSE Bug 1195951 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-22942" }, { "cve": "CVE-2022-2308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2308" } ], "notes": [ { "category": "general", "text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2308", "url": "https://www.suse.com/security/cve/CVE-2022-2308" }, { "category": "external", "summary": "SUSE Bug 1202573 for CVE-2022-2308", "url": "https://bugzilla.suse.com/1202573" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-2308" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-2588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2588" } ], "notes": [ { "category": "general", "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2588", "url": "https://www.suse.com/security/cve/CVE-2022-2588" }, { "category": "external", "summary": "SUSE Bug 1202096 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1202096" }, { "category": "external", "summary": "SUSE Bug 1203613 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1203613" }, { "category": "external", "summary": "SUSE Bug 1204183 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1204183" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2590" } ], "notes": [ { "category": "general", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2590", "url": "https://www.suse.com/security/cve/CVE-2022-2590" }, { "category": "external", "summary": "SUSE Bug 1202013 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202013" }, { "category": "external", "summary": "SUSE Bug 1202089 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2590" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-28893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28893" } ], "notes": [ { "category": "general", "text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28893", "url": "https://www.suse.com/security/cve/CVE-2022-28893" }, { "category": "external", "summary": "SUSE Bug 1198330 for CVE-2022-28893", "url": "https://bugzilla.suse.com/1198330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28893" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-29968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29968" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29968", "url": "https://www.suse.com/security/cve/CVE-2022-29968" }, { "category": "external", "summary": "SUSE Bug 1199087 for CVE-2022-29968", "url": "https://bugzilla.suse.com/1199087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2022-29968" }, { "cve": "CVE-2022-3424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3424" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3424", "url": "https://www.suse.com/security/cve/CVE-2022-3424" }, { "category": "external", "summary": "SUSE Bug 1204166 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204166" }, { "category": "external", "summary": "SUSE Bug 1204167 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204167" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1212309 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1212309" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34918" }, { "cve": "CVE-2022-3628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3628" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3628", "url": "https://www.suse.com/security/cve/CVE-2022-3628" }, { "category": "external", "summary": "SUSE Bug 1204868 for CVE-2022-3628", "url": "https://bugzilla.suse.com/1204868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3640" } ], "notes": [ { "category": "general", "text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3640", "url": "https://www.suse.com/security/cve/CVE-2022-3640" }, { "category": "external", "summary": "SUSE Bug 1204619 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204619" }, { "category": "external", "summary": "SUSE Bug 1204624 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204624" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3640" }, { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2022-41218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41218" } ], "notes": [ { "category": "general", "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41218", "url": "https://www.suse.com/security/cve/CVE-2022-41218" }, { "category": "external", "summary": "SUSE Bug 1202960 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1202960" }, { "category": "external", "summary": "SUSE Bug 1203606 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1203606" }, { "category": "external", "summary": "SUSE Bug 1205313 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1205313" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41218" }, { "cve": "CVE-2022-41674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41674" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41674", "url": "https://www.suse.com/security/cve/CVE-2022-41674" }, { "category": "external", "summary": "SUSE Bug 1203770 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203770" }, { "category": "external", "summary": "SUSE Bug 1203994 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203994" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41674" }, { "cve": "CVE-2022-42719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42719" } ], "notes": [ { "category": "general", "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42719", "url": "https://www.suse.com/security/cve/CVE-2022-42719" }, { "category": "external", "summary": "SUSE Bug 1204051 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204051" }, { "category": "external", "summary": "SUSE Bug 1204292 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204292" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42719" }, { "cve": "CVE-2022-42720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42720" } ], "notes": [ { "category": "general", "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42720", "url": "https://www.suse.com/security/cve/CVE-2022-42720" }, { "category": "external", "summary": "SUSE Bug 1204059 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204059" }, { "category": "external", "summary": "SUSE Bug 1204291 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204291" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42721" } ], "notes": [ { "category": "general", "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42721", "url": "https://www.suse.com/security/cve/CVE-2022-42721" }, { "category": "external", "summary": "SUSE Bug 1204060 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204060" }, { "category": "external", "summary": "SUSE Bug 1204290 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204290" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42722" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42722", "url": "https://www.suse.com/security/cve/CVE-2022-42722" }, { "category": "external", "summary": "SUSE Bug 1204125 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204125" }, { "category": "external", "summary": "SUSE Bug 1204289 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204289" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42722" }, { "cve": "CVE-2022-4379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4379" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4379", "url": "https://www.suse.com/security/cve/CVE-2022-4379" }, { "category": "external", "summary": "SUSE Bug 1206209 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206209" }, { "category": "external", "summary": "SUSE Bug 1206373 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-4379" }, { "cve": "CVE-2022-44032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44032" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44032", "url": "https://www.suse.com/security/cve/CVE-2022-44032" }, { "category": "external", "summary": "SUSE Bug 1204894 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1204894" }, { "category": "external", "summary": "SUSE Bug 1212290 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1212290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44032" }, { "cve": "CVE-2022-44033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44033" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44033", "url": "https://www.suse.com/security/cve/CVE-2022-44033" }, { "category": "external", "summary": "SUSE Bug 1204922 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1204922" }, { "category": "external", "summary": "SUSE Bug 1212306 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1212306" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44033" }, { "cve": "CVE-2022-44034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44034" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44034", "url": "https://www.suse.com/security/cve/CVE-2022-44034" }, { "category": "external", "summary": "SUSE Bug 1204901 for CVE-2022-44034", "url": "https://bugzilla.suse.com/1204901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44034" }, { "cve": "CVE-2022-45884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45884" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45884", "url": "https://www.suse.com/security/cve/CVE-2022-45884" }, { "category": "external", "summary": "SUSE Bug 1205756 for CVE-2022-45884", "url": "https://bugzilla.suse.com/1205756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45885" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45885", "url": "https://www.suse.com/security/cve/CVE-2022-45885" }, { "category": "external", "summary": "SUSE Bug 1205758 for CVE-2022-45885", "url": "https://bugzilla.suse.com/1205758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45886" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45886", "url": "https://www.suse.com/security/cve/CVE-2022-45886" }, { "category": "external", "summary": "SUSE Bug 1205760 for CVE-2022-45886", "url": "https://bugzilla.suse.com/1205760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45887" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45887", "url": "https://www.suse.com/security/cve/CVE-2022-45887" }, { "category": "external", "summary": "SUSE Bug 1205762 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1205762" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45888" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45888", "url": "https://www.suse.com/security/cve/CVE-2022-45888" }, { "category": "external", "summary": "SUSE Bug 1205764 for CVE-2022-45888", "url": "https://bugzilla.suse.com/1205764" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2022-45888" }, { "cve": "CVE-2022-45919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45919" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45919", "url": "https://www.suse.com/security/cve/CVE-2022-45919" }, { "category": "external", "summary": "SUSE Bug 1205803 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1205803" }, { "category": "external", "summary": "SUSE Bug 1208912 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208912" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45934" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45934", "url": "https://www.suse.com/security/cve/CVE-2022-45934" }, { "category": "external", "summary": "SUSE Bug 1205796 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1205796" }, { "category": "external", "summary": "SUSE Bug 1212292 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1212292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45934" }, { "cve": "CVE-2023-0045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0045" } ], "notes": [ { "category": "general", "text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0045", "url": "https://www.suse.com/security/cve/CVE-2023-0045" }, { "category": "external", "summary": "SUSE Bug 1207773 for CVE-2023-0045", "url": "https://bugzilla.suse.com/1207773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-0045" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1078" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1078", "url": "https://www.suse.com/security/cve/CVE-2023-1078" }, { "category": "external", "summary": "SUSE Bug 1208601 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208601" }, { "category": "external", "summary": "SUSE Bug 1208603 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-1078" }, { "cve": "CVE-2023-1192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1192" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1192", "url": "https://www.suse.com/security/cve/CVE-2023-1192" }, { "category": "external", "summary": "SUSE Bug 1208995 for CVE-2023-1192", "url": "https://bugzilla.suse.com/1208995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1192" }, { "cve": "CVE-2023-1380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1380" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1380", "url": "https://www.suse.com/security/cve/CVE-2023-1380" }, { "category": "external", "summary": "SUSE Bug 1209287 for CVE-2023-1380", "url": "https://bugzilla.suse.com/1209287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-20569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20569" } ], "notes": [ { "category": "general", "text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20569", "url": "https://www.suse.com/security/cve/CVE-2023-20569" }, { "category": "external", "summary": "SUSE Bug 1213287 for CVE-2023-20569", "url": "https://bugzilla.suse.com/1213287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20569" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-2124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2124" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2124", "url": "https://www.suse.com/security/cve/CVE-2023-2124" }, { "category": "external", "summary": "SUSE Bug 1210498 for CVE-2023-2124", "url": "https://bugzilla.suse.com/1210498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-31084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31084" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31084", "url": "https://www.suse.com/security/cve/CVE-2023-31084" }, { "category": "external", "summary": "SUSE Bug 1210783 for CVE-2023-31084", "url": "https://bugzilla.suse.com/1210783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3141" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3141", "url": "https://www.suse.com/security/cve/CVE-2023-3141" }, { "category": "external", "summary": "SUSE Bug 1212129 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1212129" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-3269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3269" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3269", "url": "https://www.suse.com/security/cve/CVE-2023-3269" }, { "category": "external", "summary": "SUSE Bug 1212395 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1212395" }, { "category": "external", "summary": "SUSE Bug 1213760 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1213760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-3269" }, { "cve": "CVE-2023-39192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39192" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39192", "url": "https://www.suse.com/security/cve/CVE-2023-39192" }, { "category": "external", "summary": "SUSE Bug 1215858 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1215858" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39193" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39193", "url": "https://www.suse.com/security/cve/CVE-2023-39193" }, { "category": "external", "summary": "SUSE Bug 1215860 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1215860" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-4128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4128" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4128", "url": "https://www.suse.com/security/cve/CVE-2023-4128" }, { "category": "external", "summary": "SUSE Bug 1214149 for CVE-2023-4128", "url": "https://bugzilla.suse.com/1214149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4128" }, { "cve": "CVE-2023-4134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4134" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4134", "url": "https://www.suse.com/security/cve/CVE-2023-4134" }, { "category": "external", "summary": "SUSE Bug 1213971 for CVE-2023-4134", "url": "https://bugzilla.suse.com/1213971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4134" }, { "cve": "CVE-2023-4194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4194" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4194", "url": "https://www.suse.com/security/cve/CVE-2023-4194" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-4194", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4194" }, { "cve": "CVE-2023-42753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42753" } ], "notes": [ { "category": "general", "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42753", "url": "https://www.suse.com/security/cve/CVE-2023-42753" }, { "category": "external", "summary": "SUSE Bug 1215150 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1215150" }, { "category": "external", "summary": "SUSE Bug 1218613 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1218613" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42753" }, { "cve": "CVE-2023-42754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42754" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42754", "url": "https://www.suse.com/security/cve/CVE-2023-42754" }, { "category": "external", "summary": "SUSE Bug 1215467 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1215467" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42756" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42756", "url": "https://www.suse.com/security/cve/CVE-2023-42756" }, { "category": "external", "summary": "SUSE Bug 1215767 for CVE-2023-42756", "url": "https://bugzilla.suse.com/1215767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42756" }, { "cve": "CVE-2023-4623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4623" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4623", "url": "https://www.suse.com/security/cve/CVE-2023-4623" }, { "category": "external", "summary": "SUSE Bug 1215115 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215115" }, { "category": "external", "summary": "SUSE Bug 1215440 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215440" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1219698 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1219698" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-46813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46813" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46813", "url": "https://www.suse.com/security/cve/CVE-2023-46813" }, { "category": "external", "summary": "SUSE Bug 1212649 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1212649" }, { "category": "external", "summary": "SUSE Bug 1216896 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1216896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-46813" }, { "cve": "CVE-2023-4881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4881" } ], "notes": [ { "category": "general", "text": "** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4881", "url": "https://www.suse.com/security/cve/CVE-2023-4881" }, { "category": "external", "summary": "SUSE Bug 1215221 for CVE-2023-4881", "url": "https://bugzilla.suse.com/1215221" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4881" }, { "cve": "CVE-2023-5345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-5345" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-5345", "url": "https://www.suse.com/security/cve/CVE-2023-5345" }, { "category": "external", "summary": "SUSE Bug 1215899 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215899" }, { "category": "external", "summary": "SUSE Bug 1215971 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-5345" }, { "cve": "CVE-2023-6606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6606" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6606", "url": "https://www.suse.com/security/cve/CVE-2023-6606" }, { "category": "external", "summary": "SUSE Bug 1217947 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1217947" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6606" }, { "cve": "CVE-2023-6610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6610" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6610", "url": "https://www.suse.com/security/cve/CVE-2023-6610" }, { "category": "external", "summary": "SUSE Bug 1217946 for CVE-2023-6610", "url": "https://bugzilla.suse.com/1217946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6610" } ] }
opensuse-su-2019:2392-1
Vulnerability from csaf_opensuse
Published
2019-10-27 18:35
Modified
2019-10-27 18:35
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).
- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).
- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).
- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).
- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- ACPI / CPPC: do not require the _PSD method (bsc#1051510).
- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- Add kernel module compression support (bsc#1135854)
For enabling the kernel module compress, add the item COMPRESS_MODULES='xz' in config.sh, then mkspec will pass it to the spec file.
- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).
- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- ALSA: hda: Flush interrupts on disabling (bsc#1051510).
- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- ALSA: hda - Inform too slow responses (bsc#1051510).
- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).
- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).
- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).
- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- blacklist 'signal: Correct namespace fixups of si_pid and si_uid' (bsc#1142667)
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- dasd_fba: Display '00000000' for zero page when dumping sense
- /dev/mem: Bail out upon SIGKILL (git-fixes).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- Fix AMD IOMMU kABI (bsc#1154610).
- Fix KVM kABI after x86 mmu backports (bsc#1117665).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- HID: apple: Fix stuck function keys when using FN (bsc#1051510).
- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).
- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).
- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- PCI: PM: Fix pci_power_up() (bsc#1051510).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- Pull packaging cleanup from mkubecek.
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- RDMA: Fix goto target to release the allocated memory (bsc#1050244).
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- scripts/arch-symbols: add missing link.
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- Sign non-x86 kernels when possible (boo#1134303)
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames
openSUSE-2019-2392
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c lacked a certain upper-bound check, leading to a buffer overflow (bnc#1154372).\n- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).\n- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).\n- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).\n- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add kernel module compression support (bsc#1135854)\n For enabling the kernel module compress, add the item COMPRESS_MODULES=\u0027xz\u0027 in config.sh, then mkspec will pass it to the spec file.\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blacklist \u0027signal: Correct namespace fixups of si_pid and si_uid\u0027 (bsc#1142667)\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense\n- /dev/mem: Bail out upon SIGKILL (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix KVM kABI after x86 mmu backports (bsc#1117665).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- Pull packaging cleanup from mkubecek.\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- Sign non-x86 kernels when possible (boo#1134303)\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- Update patches.suse/NFSv4-Check-the-return-value-of-update_open_stateid.patch (boo#1154189 bsc#1154747).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2392", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2392-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2392-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2392-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098291", "url": "https://bugzilla.suse.com/1098291" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1133140", "url": "https://bugzilla.suse.com/1133140" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135854", "url": "https://bugzilla.suse.com/1135854" }, { "category": "self", "summary": "SUSE Bug 1135873", "url": "https://bugzilla.suse.com/1135873" }, { "category": "self", "summary": "SUSE Bug 1137799", "url": "https://bugzilla.suse.com/1137799" }, { "category": "self", "summary": "SUSE Bug 1140729", "url": "https://bugzilla.suse.com/1140729" }, { "category": "self", "summary": "SUSE Bug 1140845", "url": "https://bugzilla.suse.com/1140845" }, { "category": "self", "summary": "SUSE Bug 1140883", "url": "https://bugzilla.suse.com/1140883" }, { "category": "self", "summary": "SUSE Bug 1141600", "url": "https://bugzilla.suse.com/1141600" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142667", "url": "https://bugzilla.suse.com/1142667" }, { "category": "self", "summary": "SUSE Bug 1144375", "url": "https://bugzilla.suse.com/1144375" }, { "category": "self", "summary": "SUSE Bug 1144449", "url": "https://bugzilla.suse.com/1144449" }, { "category": "self", "summary": "SUSE Bug 1145099", "url": "https://bugzilla.suse.com/1145099" }, { "category": "self", "summary": "SUSE Bug 1148410", "url": "https://bugzilla.suse.com/1148410" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150875", "url": "https://bugzilla.suse.com/1150875" }, { "category": "self", "summary": "SUSE Bug 1151508", "url": "https://bugzilla.suse.com/1151508" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1152791", "url": "https://bugzilla.suse.com/1152791" }, { "category": "self", "summary": "SUSE Bug 1153112", "url": "https://bugzilla.suse.com/1153112" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153236", "url": "https://bugzilla.suse.com/1153236" }, { "category": "self", "summary": "SUSE Bug 1153263", "url": "https://bugzilla.suse.com/1153263" }, { "category": "self", "summary": "SUSE Bug 1153646", "url": "https://bugzilla.suse.com/1153646" }, { "category": "self", "summary": "SUSE Bug 1153713", "url": "https://bugzilla.suse.com/1153713" }, { "category": "self", "summary": "SUSE Bug 1153717", "url": "https://bugzilla.suse.com/1153717" }, { "category": "self", "summary": "SUSE Bug 1153718", "url": "https://bugzilla.suse.com/1153718" }, { "category": "self", "summary": "SUSE Bug 1153719", "url": "https://bugzilla.suse.com/1153719" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1154108", "url": "https://bugzilla.suse.com/1154108" }, { "category": "self", "summary": "SUSE Bug 1154189", "url": "https://bugzilla.suse.com/1154189" }, { "category": "self", "summary": "SUSE Bug 1154354", "url": "https://bugzilla.suse.com/1154354" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1154578", "url": "https://bugzilla.suse.com/1154578" }, { "category": "self", "summary": "SUSE Bug 1154607", "url": "https://bugzilla.suse.com/1154607" }, { "category": "self", "summary": "SUSE Bug 1154608", "url": "https://bugzilla.suse.com/1154608" }, { "category": "self", "summary": "SUSE Bug 1154610", "url": "https://bugzilla.suse.com/1154610" }, { "category": "self", "summary": "SUSE Bug 1154611", "url": "https://bugzilla.suse.com/1154611" }, { "category": "self", "summary": "SUSE Bug 1154651", "url": "https://bugzilla.suse.com/1154651" }, { "category": "self", "summary": "SUSE Bug 1154747", "url": "https://bugzilla.suse.com/1154747" }, { "category": "self", "summary": "SUSE Bug 118461_FIXME", "url": "https://bugzilla.suse.com/118461_FIXME" }, { "category": "self", "summary": "SUSE Bug 133135_FIXME", "url": "https://bugzilla.suse.com/133135_FIXME" }, { "category": "self", "summary": "SUSE Bug 135757_FIXME", "url": "https://bugzilla.suse.com/135757_FIXME" }, { "category": "self", "summary": "SUSE Bug 147830_FIXME", "url": "https://bugzilla.suse.com/147830_FIXME" }, { "category": "self", "summary": "SUSE Bug 147831_FIXME", "url": "https://bugzilla.suse.com/147831_FIXME" }, { "category": "self", "summary": "SUSE Bug 158172_FIXME", "url": "https://bugzilla.suse.com/158172_FIXME" }, { "category": "self", "summary": "SUSE Bug 165544_FIXME", "url": "https://bugzilla.suse.com/165544_FIXME" }, { "category": "self", "summary": "SUSE Bug 166495_FIXME", "url": "https://bugzilla.suse.com/166495_FIXME" }, { "category": "self", "summary": "SUSE Bug 172859_FIXME", "url": "https://bugzilla.suse.com/172859_FIXME" }, { "category": "self", "summary": "SUSE Bug 172860_FIXME", "url": "https://bugzilla.suse.com/172860_FIXME" }, { "category": "self", "summary": "SUSE Bug 181778_FIXME", "url": "https://bugzilla.suse.com/181778_FIXME" }, { "category": "self", "summary": "SUSE Bug 229268_FIXME", "url": "https://bugzilla.suse.com/229268_FIXME" }, { "category": "self", "summary": "SUSE Bug 229269_FIXME", "url": "https://bugzilla.suse.com/229269_FIXME" }, { "category": "self", "summary": "SUSE Bug 229270_FIXME", "url": "https://bugzilla.suse.com/229270_FIXME" }, { "category": "self", "summary": "SUSE Bug 229274_FIXME", "url": "https://bugzilla.suse.com/229274_FIXME" }, { "category": "self", "summary": "SUSE Bug 229277_FIXME", "url": "https://bugzilla.suse.com/229277_FIXME" }, { "category": "self", "summary": "SUSE Bug 229279_FIXME", "url": "https://bugzilla.suse.com/229279_FIXME" }, { "category": "self", "summary": "SUSE Bug 229280_FIXME", "url": "https://bugzilla.suse.com/229280_FIXME" }, { "category": "self", "summary": "SUSE Bug 229281_FIXME", "url": "https://bugzilla.suse.com/229281_FIXME" }, { "category": "self", "summary": "SUSE Bug 229283_FIXME", "url": "https://bugzilla.suse.com/229283_FIXME" }, { "category": "self", "summary": "SUSE Bug 229285_FIXME", "url": "https://bugzilla.suse.com/229285_FIXME" }, { "category": "self", "summary": "SUSE Bug 229286_FIXME", "url": "https://bugzilla.suse.com/229286_FIXME" }, { "category": "self", "summary": "SUSE Bug 229297_FIXME", "url": "https://bugzilla.suse.com/229297_FIXME" }, { "category": "self", "summary": "SUSE Bug 296718_FIXME", "url": "https://bugzilla.suse.com/296718_FIXME" }, { "category": "self", "summary": "SUSE Bug 358767_FIXME", "url": "https://bugzilla.suse.com/358767_FIXME" }, { "category": "self", "summary": "SUSE Bug 359798_FIXME", "url": "https://bugzilla.suse.com/359798_FIXME" }, { "category": "self", "summary": "SUSE Bug 802154", "url": "https://bugzilla.suse.com/802154" }, { "category": "self", "summary": "SUSE Bug 814594", "url": "https://bugzilla.suse.com/814594" }, { "category": "self", "summary": "SUSE Bug 919448", "url": "https://bugzilla.suse.com/919448" }, { "category": "self", "summary": "SUSE Bug 987367", "url": "https://bugzilla.suse.com/987367" }, { "category": "self", "summary": "SUSE Bug 998153", "url": "https://bugzilla.suse.com/998153" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-10-27T18:35:05Z", "generator": { "date": "2019-10-27T18:35:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2392-1", "initial_release_date": "2019-10-27T18:35:05Z", "revision_history": [ { "date": "2019-10-27T18:35:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-devel-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-docs-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-macros-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-source-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-source-4.12.14-lp150.12.79.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-debug-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-default-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-syms-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.79.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.79.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-27T18:35:05Z", "details": "moderate" } ], "title": "CVE-2019-17666" } ] }
cnvd-2019-31637
Vulnerability from cnvd
Title: Linux kernel空指针解引用漏洞(CNVD-2019-31637)
Description:
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 5.2.14存在空指针解引用漏洞。该漏洞源于drivers/net/wireless/marvell/libertas/if_sdio.c不检查alloc_workqueue返回值。攻击者可利用该漏洞导致拒绝服务。
Severity: 高
Patch Name: Linux kernel空指针解引用漏洞(CNVD-2019-31637)的补丁
Patch Description:
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 5.2.14存在空指针解引用漏洞。该漏洞源于drivers/net/wireless/marvell/libertas/if_sdio.c不检查alloc_workqueue返回值。攻击者可利用该漏洞导致拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://lkml.org/lkml/2019/9/9/487
Reference: https://nvd.nist.gov/vuln/detail/CVE-2019-16232
Impacted products
Name | Linux kernel 5.2.14 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-16232", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-16232" } }, "description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u53d1\u5e03\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel 5.2.14\u5b58\u5728\u7a7a\u6307\u9488\u89e3\u5f15\u7528\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8edrivers/net/wireless/marvell/libertas/if_sdio.c\u4e0d\u68c0\u67e5alloc_workqueue\u8fd4\u56de\u503c\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002", "discovererName": "unknwon", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://lkml.org/lkml/2019/9/9/487", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-31637", "openTime": "2019-09-16", "patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u53d1\u5e03\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel 5.2.14\u5b58\u5728\u7a7a\u6307\u9488\u89e3\u5f15\u7528\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8edrivers/net/wireless/marvell/libertas/if_sdio.c\u4e0d\u68c0\u67e5alloc_workqueue\u8fd4\u56de\u503c\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Linux kernel\u7a7a\u6307\u9488\u89e3\u5f15\u7528\u6f0f\u6d1e\uff08CNVD-2019-31637\uff09\u7684\u8865\u4e01", "products": { "product": "Linux kernel 5.2.14" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-16232", "serverity": "\u9ad8", "submitTime": "2019-09-12", "title": "Linux kernel\u7a7a\u6307\u9488\u89e3\u5f15\u7528\u6f0f\u6d1e\uff08CNVD-2019-31637\uff09" }
suse-su-2019:2950-1
Vulnerability from csaf_suse
Published
2019-11-12 18:12
Modified
2019-11-12 18:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.
The Linux Kernel KVM hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.
More information can be found on https://www.suse.com/support/kb/doc/?id=7023735
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
Transactional Memory support could be used to facilitate sidechannel
information leaks out of microarchitectural buffers, similar to the previously
described 'Microarchitectural Data Sampling' attack.
The Linux kernel was supplemented with the option to disable TSX operation
altogether (requiring CPU Microcode updates on older systems) and better
flushing of microarchitectural buffers (VERW).
The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
alloc_workqueue return value, leading to a NULL pointer dereference.
(bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
space. (bsc#1144903).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
libertas driver (bsc#1150465).
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
socket (bnc#1152782).
- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
meant that unprivileged users could create a raw socket (bsc#1152788).
- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
which caused an i_size_read() infinite loop and denial of service on SMP
systems (bnc#1151347).
- CVE-2019-15902: A backporting issue was discovered that re-introduced the
Spectre vulnerability it had aimed to eliminate. This occurred because the
backport process depends on cherry picking specific commits, and because two
(correctly ordered) code lines were swapped (bnc#1149376).
- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
by a malicious USB device (bnc#11465).
- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
to cause denial of service (bnc#1148938).
- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's KVM
hypervisor. An unprivileged host user or process with access to '/dev/kvm'
device could use this flaw to crash the host kernel, resulting in a denial of
service or potentially escalating privileges on the system (bnc#1151350).
- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
crafted USB device traffic (bnc#1147122).
- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
(bnc#1149555).
- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
functionality that translates virtqueue buffers to IOVs. A privileged guest
user able to pass descriptors with invalid length to the host could use this
flaw to increase their privileges on the host (bnc#1150112).
- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
USB device (bnc#1146361).
- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
fixed. This issue could lead to local escalation of privilege with System
execution privileges needed. (bnc#1150025).
- CVE-2019-15926: An out-of-bounds access was fixed in the
drivers/net/wireless/ath/ath6kl module. (bnc#1149527).
- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
module (bnc#1149522).
- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
a malicious USB device (bnc#1146524).
- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
malicious USB device (bnc#1146526).
- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
a malicious USB device (bnc#1146529).
- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
chip driver. That issue allowed local users to cause a denial of service
(system crash) or possibly execute arbitrary code (bnc#1146512).
- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
(bsc#1146512, bsc#1146514, bsc#1146516).
- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
was fixed. Local users would have abused this issue to cause a denial of
service (system crash) or possibly execute arbitrary code (bnc#1146516).
- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
option, an attacker could control a pointer in kernel land and cause an
inet_csk_listen_stop general protection fault, or potentially execute
arbitrary code under certain circumstances. The issue can be triggered as
root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
capability) or after namespace unsharing. (bnc#1145477)
- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
low encryption key length and did not prevent an attacker from influencing
the key length negotiation. This allowed practical brute-force attacks (aka
'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
the victim noticing (bnc#1137865).
- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
fixed (bnc#1146378).
- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
was fixed (bsc#1146378).
- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
(bnc#1146391).
- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
(bnc#1146584).
- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).
- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
was fixed in the drivers/media/usb/siano driver (bnc#1146413).
- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).
- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
(bnc#1146285).
- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver
(bnc#1146163).
- CVE-2019-10207: Add checks for missing tty operations to prevent unprivileged
user to execute 0x0 address (bsc#1142857 bsc#1123959)
- CVE-2019-15118: ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term
leading to kernel stack exhaustion (bsc#1145922).
The following non-security bugs were fixed:
- array_index_nospec: Sanitize speculative array (bsc#1155671)
- hpsa: move lockup_detected attribute to host attr (bsc#999278, bsc#1153119).
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop read-only large sptes when creating lower level sptes (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1137944).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- tcp: Be more careful in tcp_fragment() (bsc#1137586 bsc#1139751).
Patchnames
SUSE-2019-2950,SUSE-SLE-Module-Public-Cloud-12-2019-2950,SUSE-SLE-SAP-12-SP1-2019-2950,SUSE-SLE-SERVER-12-SP1-2019-2950
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.\n\nThe Linux Kernel KVM hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.\nMore information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\nTransactional Memory support could be used to facilitate sidechannel\ninformation leaks out of microarchitectural buffers, similar to the previously\ndescribed \u0027Microarchitectural Data Sampling\u0027 attack.\n\nThe Linux kernel was supplemented with the option to disable TSX operation\naltogether (requiring CPU Microcode updates on older systems) and better\nflushing of microarchitectural buffers (VERW).\n\nThe set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not\n enforce CAP_NET_RAW, which meant that unprivileged users could create a raw\n socket (bnc#1152782).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,\n which caused an i_size_read() infinite loop and denial of service on SMP\n systems (bnc#1151347).\n\n- CVE-2019-15902: A backporting issue was discovered that re-introduced the\n Spectre vulnerability it had aimed to eliminate. This occurred because the\n backport process depends on cherry picking specific commits, and because two\n (correctly ordered) code lines were swapped (bnc#1149376).\n\n- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused\n by a malicious USB device (bnc#11465).\n\n- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused\n to cause denial of service (bnc#1148938).\n\n- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel\u0027s KVM\n hypervisor. An unprivileged host user or process with access to \u0027/dev/kvm\u0027\n device could use this flaw to crash the host kernel, resulting in a denial of\n service or potentially escalating privileges on the system (bnc#1151350).\n\n- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by\n crafted USB device traffic (bnc#1147122).\n\n- CVE-2017-18595: A double free in allocate_trace_buffer was fixed\n (bnc#1149555).\n\n- CVE-2019-14835: A buffer overflow flaw was found in the kernel\u0027s vhost\n functionality that translates virtqueue buffers to IOVs. A privileged guest\n user able to pass descriptors with invalid length to the host could use this\n flaw to increase their privileges on the host (bnc#1150112).\n\n- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious\n USB device (bnc#1146361).\n\n- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been\n fixed. This issue could lead to local escalation of privilege with System\n execution privileges needed. (bnc#1150025).\n\n- CVE-2019-15926: An out-of-bounds access was fixed in the\n drivers/net/wireless/ath/ath6kl module. (bnc#1149527).\n\n- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer\n module (bnc#1149522).\n\n- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by\n a malicious USB device (bnc#1146524).\n\n- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a\n malicious USB device (bnc#1146526).\n\n- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by\n a malicious USB device (bnc#1146529).\n\n- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi\n chip driver. That issue allowed local users to cause a denial of service\n (system crash) or possibly execute arbitrary code (bnc#1146512).\n\n- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed\n (bsc#1146512, bsc#1146514, bsc#1146516).\n\n- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver\n was fixed. Local users would have abused this issue to cause a denial of\n service (system crash) or possibly execute arbitrary code (bnc#1146516).\n\n- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket\n option, an attacker could control a pointer in kernel land and cause an\n inet_csk_listen_stop general protection fault, or potentially execute\n arbitrary code under certain circumstances. The issue can be triggered as\n root (e.g., inside a default LXC container or with the CAP_NET_ADMIN\n capability) or after namespace unsharing. (bnc#1145477)\n\n- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently\n low encryption key length and did not prevent an attacker from influencing\n the key length negotiation. This allowed practical brute-force attacks (aka\n \u0027KNOB\u0027) that could decrypt traffic and inject arbitrary ciphertext without\n the victim noticing (bnc#1137865).\n\n- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was\n fixed (bnc#1146378).\n\n- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe\n was fixed (bsc#1146378).\n\n- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver\n (bnc#1146391).\n\n- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc\n (bnc#1146584).\n\n- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB\n device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).\n\n- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device\n was fixed in the drivers/media/usb/siano driver (bnc#1146413).\n\n- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).\n\n- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver\n (bnc#1146285).\n\n- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver\n (bnc#1146163).\n\n- CVE-2019-10207: Add checks for missing tty operations to prevent unprivileged\n user to execute 0x0 address (bsc#1142857 bsc#1123959)\n\n- CVE-2019-15118: ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term\n leading to kernel stack exhaustion (bsc#1145922).\n\nThe following non-security bugs were fixed:\n\n- array_index_nospec: Sanitize speculative array (bsc#1155671)\n- hpsa: move lockup_detected attribute to host attr (bsc#999278, bsc#1153119).\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop read-only large sptes when creating lower level sptes (bsc#1117665).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- media: smsusb: better handle optional alignment (bsc#1146413).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1137944).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- tcp: Be more careful in tcp_fragment() (bsc#1137586 bsc#1139751).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2950,SUSE-SLE-Module-Public-Cloud-12-2019-2950,SUSE-SLE-SAP-12-SP1-2019-2950,SUSE-SLE-SERVER-12-SP1-2019-2950", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2950-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2950-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2950-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1123959", "url": "https://bugzilla.suse.com/1123959" }, { "category": "self", "summary": "SUSE Bug 1137586", "url": "https://bugzilla.suse.com/1137586" }, { "category": "self", "summary": "SUSE Bug 1137865", "url": "https://bugzilla.suse.com/1137865" }, { "category": "self", "summary": "SUSE Bug 1137944", "url": "https://bugzilla.suse.com/1137944" }, { "category": "self", "summary": "SUSE Bug 1139073", "url": "https://bugzilla.suse.com/1139073" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE Bug 1142857", "url": "https://bugzilla.suse.com/1142857" }, { "category": "self", "summary": "SUSE Bug 1144903", "url": "https://bugzilla.suse.com/1144903" }, { "category": "self", "summary": "SUSE Bug 1145477", "url": "https://bugzilla.suse.com/1145477" }, { "category": "self", "summary": "SUSE Bug 1145922", "url": "https://bugzilla.suse.com/1145922" }, { "category": "self", "summary": "SUSE Bug 1146042", "url": "https://bugzilla.suse.com/1146042" }, { "category": "self", "summary": "SUSE Bug 1146163", "url": "https://bugzilla.suse.com/1146163" }, { "category": "self", "summary": "SUSE Bug 1146285", "url": "https://bugzilla.suse.com/1146285" }, { "category": "self", "summary": "SUSE Bug 1146361", "url": "https://bugzilla.suse.com/1146361" }, { "category": "self", "summary": "SUSE Bug 1146378", "url": "https://bugzilla.suse.com/1146378" }, { "category": "self", "summary": "SUSE Bug 1146391", "url": "https://bugzilla.suse.com/1146391" }, { "category": "self", "summary": "SUSE Bug 1146413", "url": "https://bugzilla.suse.com/1146413" }, { "category": "self", "summary": "SUSE Bug 1146425", "url": "https://bugzilla.suse.com/1146425" }, { "category": "self", "summary": "SUSE Bug 1146512", "url": "https://bugzilla.suse.com/1146512" }, { "category": "self", "summary": "SUSE Bug 1146514", "url": "https://bugzilla.suse.com/1146514" }, { "category": "self", "summary": "SUSE Bug 1146516", "url": "https://bugzilla.suse.com/1146516" }, { "category": "self", "summary": "SUSE Bug 1146519", "url": "https://bugzilla.suse.com/1146519" }, { "category": "self", "summary": "SUSE Bug 1146524", "url": "https://bugzilla.suse.com/1146524" }, { "category": "self", "summary": "SUSE Bug 1146526", "url": "https://bugzilla.suse.com/1146526" }, { "category": "self", "summary": "SUSE Bug 1146529", "url": "https://bugzilla.suse.com/1146529" }, { "category": "self", "summary": "SUSE Bug 1146540", "url": "https://bugzilla.suse.com/1146540" }, { "category": "self", "summary": "SUSE Bug 1146543", "url": "https://bugzilla.suse.com/1146543" }, { "category": "self", "summary": "SUSE Bug 1146547", "url": "https://bugzilla.suse.com/1146547" }, { "category": "self", "summary": "SUSE Bug 1146584", "url": "https://bugzilla.suse.com/1146584" }, { "category": "self", "summary": "SUSE Bug 1146612", "url": "https://bugzilla.suse.com/1146612" }, { "category": "self", "summary": "SUSE Bug 1147122", "url": "https://bugzilla.suse.com/1147122" }, { "category": "self", "summary": "SUSE Bug 1148938", "url": "https://bugzilla.suse.com/1148938" }, { "category": "self", "summary": "SUSE Bug 1149376", "url": "https://bugzilla.suse.com/1149376" }, { "category": "self", "summary": "SUSE Bug 1149522", "url": "https://bugzilla.suse.com/1149522" }, { "category": "self", "summary": "SUSE Bug 1149527", "url": "https://bugzilla.suse.com/1149527" }, { "category": "self", "summary": "SUSE Bug 1149555", "url": "https://bugzilla.suse.com/1149555" }, { "category": "self", "summary": "SUSE Bug 1150025", "url": "https://bugzilla.suse.com/1150025" }, { "category": "self", "summary": "SUSE Bug 1150112", "url": "https://bugzilla.suse.com/1150112" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150457", "url": "https://bugzilla.suse.com/1150457" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1151347", "url": "https://bugzilla.suse.com/1151347" }, { "category": "self", "summary": "SUSE Bug 1151350", "url": "https://bugzilla.suse.com/1151350" }, { "category": "self", "summary": "SUSE Bug 1152782", "url": "https://bugzilla.suse.com/1152782" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1153119", "url": "https://bugzilla.suse.com/1153119" }, { "category": "self", "summary": "SUSE Bug 1155671", "url": "https://bugzilla.suse.com/1155671" }, { "category": "self", "summary": "SUSE Bug 999278", "url": "https://bugzilla.suse.com/999278" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10906 page", "url": "https://www.suse.com/security/cve/CVE-2016-10906/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18509 page", "url": "https://www.suse.com/security/cve/CVE-2017-18509/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18551 page", "url": "https://www.suse.com/security/cve/CVE-2017-18551/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18595 page", "url": "https://www.suse.com/security/cve/CVE-2017-18595/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12207 page", "url": "https://www.suse.com/security/cve/CVE-2018-12207/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20976 page", "url": "https://www.suse.com/security/cve/CVE-2018-20976/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11135 page", "url": "https://www.suse.com/security/cve/CVE-2019-11135/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14815 page", "url": "https://www.suse.com/security/cve/CVE-2019-14815/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14816 page", "url": "https://www.suse.com/security/cve/CVE-2019-14816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14821 page", "url": "https://www.suse.com/security/cve/CVE-2019-14821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14835 page", "url": "https://www.suse.com/security/cve/CVE-2019-14835/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15118 page", "url": "https://www.suse.com/security/cve/CVE-2019-15118/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15212 page", "url": "https://www.suse.com/security/cve/CVE-2019-15212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15215 page", "url": "https://www.suse.com/security/cve/CVE-2019-15215/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15216 page", "url": "https://www.suse.com/security/cve/CVE-2019-15216/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15217 page", "url": "https://www.suse.com/security/cve/CVE-2019-15217/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15218 page", "url": "https://www.suse.com/security/cve/CVE-2019-15218/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15219 page", "url": "https://www.suse.com/security/cve/CVE-2019-15219/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15220 page", "url": "https://www.suse.com/security/cve/CVE-2019-15220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15221 page", "url": "https://www.suse.com/security/cve/CVE-2019-15221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15291 page", "url": "https://www.suse.com/security/cve/CVE-2019-15291/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15505 page", "url": "https://www.suse.com/security/cve/CVE-2019-15505/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15807 page", "url": "https://www.suse.com/security/cve/CVE-2019-15807/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15926 page", "url": "https://www.suse.com/security/cve/CVE-2019-15926/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15927 page", "url": "https://www.suse.com/security/cve/CVE-2019-15927/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16233 page", "url": "https://www.suse.com/security/cve/CVE-2019-16233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16413 page", "url": "https://www.suse.com/security/cve/CVE-2019-16413/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17055 page", "url": "https://www.suse.com/security/cve/CVE-2019-17055/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9456 page", "url": "https://www.suse.com/security/cve/CVE-2019-9456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9506 page", "url": "https://www.suse.com/security/cve/CVE-2019-9506/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-11-12T18:12:17Z", "generator": { "date": "2019-11-12T18:12:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2950-1", "initial_release_date": "2019-11-12T18:12:17Z", "revision_history": [ { "date": "2019-11-12T18:12:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.124.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.124.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.124.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.74-60.64.124.1.noarch", "product": { "name": "kernel-docs-3.12.74-60.64.124.1.noarch", "product_id": "kernel-docs-3.12.74-60.64.124.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.124.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.124.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.124.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.124.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.124.1.noarch", "product_id": "kernel-source-3.12.74-60.64.124.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.12.74-60.64.124.1.noarch", "product": { "name": "kernel-source-vanilla-3.12.74-60.64.124.1.noarch", "product_id": "kernel-source-vanilla-3.12.74-60.64.124.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-debug-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-debug-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-debug-base-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-debug-base-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-debug-devel-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-debug-devel-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-debug-extra-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-debug-extra-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-default-extra-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-default-extra-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-obs-build-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-obs-qa-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-obs-qa-3.12.74-60.64.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.124.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.124.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.124.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.124.1.s390x", "product_id": "kernel-default-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.124.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.124.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-default-extra-3.12.74-60.64.124.1.s390x", "product_id": "kernel-default-extra-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.124.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-obs-build-3.12.74-60.64.124.1.s390x", "product_id": "kernel-obs-build-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-obs-qa-3.12.74-60.64.124.1.s390x", "product_id": "kernel-obs-qa-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.124.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-vanilla-3.12.74-60.64.124.1.s390x", "product_id": "kernel-vanilla-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-vanilla-devel-3.12.74-60.64.124.1.s390x", "product_id": "kernel-vanilla-devel-3.12.74-60.64.124.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-3.12.74-60.64.124.1.s390x", "product": { "name": "kernel-zfcpdump-3.12.74-60.64.124.1.s390x", "product_id": "kernel-zfcpdump-3.12.74-60.64.124.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-debug-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-debug-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-debug-base-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-debug-base-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-debug-devel-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-debug-devel-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-debug-extra-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-debug-extra-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-default-extra-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-default-extra-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-ec2-base-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-ec2-base-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-obs-build-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-obs-build-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-obs-qa-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-obs-qa-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-vanilla-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-vanilla-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-vanilla-devel-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-vanilla-devel-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.12.74-60.64.124.1.x86_64", "product": { "name": "kernel-xen-extra-3.12.74-60.64.124.1.x86_64", "product_id": "kernel-xen-extra-3.12.74-60.64.124.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10906" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10906", "url": "https://www.suse.com/security/cve/CVE-2016-10906" }, { "category": "external", "summary": "SUSE Bug 1146584 for CVE-2016-10906", "url": "https://bugzilla.suse.com/1146584" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2016-10906" }, { "cve": "CVE-2017-18509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18509" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18509", "url": "https://www.suse.com/security/cve/CVE-2017-18509" }, { "category": "external", "summary": "SUSE Bug 1145477 for CVE-2017-18509", "url": "https://bugzilla.suse.com/1145477" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2017-18509" }, { "cve": "CVE-2017-18551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18551" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18551", "url": "https://www.suse.com/security/cve/CVE-2017-18551" }, { "category": "external", "summary": "SUSE Bug 1146163 for CVE-2017-18551", "url": "https://bugzilla.suse.com/1146163" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2017-18551" }, { "cve": "CVE-2017-18595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18595" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18595", "url": "https://www.suse.com/security/cve/CVE-2017-18595" }, { "category": "external", "summary": "SUSE Bug 1149555 for CVE-2017-18595", "url": "https://bugzilla.suse.com/1149555" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2017-18595" }, { "cve": "CVE-2018-12207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12207" } ], "notes": [ { "category": "general", "text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12207", "url": "https://www.suse.com/security/cve/CVE-2018-12207" }, { "category": "external", "summary": "SUSE Bug 1117665 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1117665" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1155812 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155812" }, { "category": "external", "summary": "SUSE Bug 1155817 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155817" }, { "category": "external", "summary": "SUSE Bug 1155945 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155945" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2018-12207" }, { "cve": "CVE-2018-20976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20976" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20976", "url": "https://www.suse.com/security/cve/CVE-2018-20976" }, { "category": "external", "summary": "SUSE Bug 1146285 for CVE-2018-20976", "url": "https://bugzilla.suse.com/1146285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2018-20976" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "important" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-11135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11135" } ], "notes": [ { "category": "general", "text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11135", "url": "https://www.suse.com/security/cve/CVE-2019-11135" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152497 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152497" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1152506 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152506" }, { "category": "external", "summary": "SUSE Bug 1160120 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1160120" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-11135" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "important" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14815" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14815", "url": "https://www.suse.com/security/cve/CVE-2019-14815" }, { "category": "external", "summary": "SUSE Bug 1146514 for CVE-2019-14815", "url": "https://bugzilla.suse.com/1146514" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14815", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "important" } ], "title": "CVE-2019-14815" }, { "cve": "CVE-2019-14816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14816" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14816", "url": "https://www.suse.com/security/cve/CVE-2019-14816" }, { "category": "external", "summary": "SUSE Bug 1146516 for CVE-2019-14816", "url": "https://bugzilla.suse.com/1146516" }, { "category": "external", "summary": "SUSE Bug 1173666 for CVE-2019-14816", "url": "https://bugzilla.suse.com/1173666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "important" } ], "title": "CVE-2019-14816" }, { "cve": "CVE-2019-14821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14821" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14821", "url": "https://www.suse.com/security/cve/CVE-2019-14821" }, { "category": "external", "summary": "SUSE Bug 1151350 for CVE-2019-14821", "url": "https://bugzilla.suse.com/1151350" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2019-14821", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-14821" }, { "cve": "CVE-2019-14835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14835" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14835", "url": "https://www.suse.com/security/cve/CVE-2019-14835" }, { "category": "external", "summary": "SUSE Bug 1150112 for CVE-2019-14835", "url": "https://bugzilla.suse.com/1150112" }, { "category": "external", "summary": "SUSE Bug 1151021 for CVE-2019-14835", "url": "https://bugzilla.suse.com/1151021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "important" } ], "title": "CVE-2019-14835" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15118" } ], "notes": [ { "category": "general", "text": "check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15118", "url": "https://www.suse.com/security/cve/CVE-2019-15118" }, { "category": "external", "summary": "SUSE Bug 1145922 for CVE-2019-15118", "url": "https://bugzilla.suse.com/1145922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15118" }, { "cve": "CVE-2019-15212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15212", "url": "https://www.suse.com/security/cve/CVE-2019-15212" }, { "category": "external", "summary": "SUSE Bug 1146391 for CVE-2019-15212", "url": "https://bugzilla.suse.com/1146391" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15212", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15212", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15212", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15212" }, { "cve": "CVE-2019-15215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15215" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15215", "url": "https://www.suse.com/security/cve/CVE-2019-15215" }, { "category": "external", "summary": "SUSE Bug 1146425 for CVE-2019-15215", "url": "https://bugzilla.suse.com/1146425" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15215", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15215", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15215", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15215" }, { "cve": "CVE-2019-15216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15216" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15216", "url": "https://www.suse.com/security/cve/CVE-2019-15216" }, { "category": "external", "summary": "SUSE Bug 1146361 for CVE-2019-15216", "url": "https://bugzilla.suse.com/1146361" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15216", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15216", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15216", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15216" }, { "cve": "CVE-2019-15217", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15217" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15217", "url": "https://www.suse.com/security/cve/CVE-2019-15217" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15217", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146547 for CVE-2019-15217", "url": "https://bugzilla.suse.com/1146547" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15217", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15217", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15217" }, { "cve": "CVE-2019-15218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15218" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15218", "url": "https://www.suse.com/security/cve/CVE-2019-15218" }, { "category": "external", "summary": "SUSE Bug 1146413 for CVE-2019-15218", "url": "https://bugzilla.suse.com/1146413" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15218", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15218", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15218", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15218" }, { "cve": "CVE-2019-15219", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15219" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15219", "url": "https://www.suse.com/security/cve/CVE-2019-15219" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15219", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146524 for CVE-2019-15219", "url": "https://bugzilla.suse.com/1146524" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15219", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15219", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15219" }, { "cve": "CVE-2019-15220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15220" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15220", "url": "https://www.suse.com/security/cve/CVE-2019-15220" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15220", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146526 for CVE-2019-15220", "url": "https://bugzilla.suse.com/1146526" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15220", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15220", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15220" }, { "cve": "CVE-2019-15221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15221" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15221", "url": "https://www.suse.com/security/cve/CVE-2019-15221" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15221", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146529 for CVE-2019-15221", "url": "https://bugzilla.suse.com/1146529" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15221", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15221", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15221" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15291", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15291" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15291", "url": "https://www.suse.com/security/cve/CVE-2019-15291" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146540 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1146540" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15291" }, { "cve": "CVE-2019-15505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15505" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15505", "url": "https://www.suse.com/security/cve/CVE-2019-15505" }, { "category": "external", "summary": "SUSE Bug 1147122 for CVE-2019-15505", "url": "https://bugzilla.suse.com/1147122" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15505" }, { "cve": "CVE-2019-15807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15807" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15807", "url": "https://www.suse.com/security/cve/CVE-2019-15807" }, { "category": "external", "summary": "SUSE Bug 1148938 for CVE-2019-15807", "url": "https://bugzilla.suse.com/1148938" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15807" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-15926", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15926" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15926", "url": "https://www.suse.com/security/cve/CVE-2019-15926" }, { "category": "external", "summary": "SUSE Bug 1149527 for CVE-2019-15926", "url": "https://bugzilla.suse.com/1149527" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15926" }, { "cve": "CVE-2019-15927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15927" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15927", "url": "https://www.suse.com/security/cve/CVE-2019-15927" }, { "category": "external", "summary": "SUSE Bug 1149522 for CVE-2019-15927", "url": "https://bugzilla.suse.com/1149522" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-15927" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16233" } ], "notes": [ { "category": "general", "text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16233", "url": "https://www.suse.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "SUSE Bug 1150457 for CVE-2019-16233", "url": "https://bugzilla.suse.com/1150457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "low" } ], "title": "CVE-2019-16233" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-16413", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16413" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16413", "url": "https://www.suse.com/security/cve/CVE-2019-16413" }, { "category": "external", "summary": "SUSE Bug 1151347 for CVE-2019-16413", "url": "https://bugzilla.suse.com/1151347" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-16413" }, { "cve": "CVE-2019-17055", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17055" } ], "notes": [ { "category": "general", "text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17055", "url": "https://www.suse.com/security/cve/CVE-2019-17055" }, { "category": "external", "summary": "SUSE Bug 1152782 for CVE-2019-17055", "url": "https://bugzilla.suse.com/1152782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "low" } ], "title": "CVE-2019-17055" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-9456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9456" } ], "notes": [ { "category": "general", "text": "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9456", "url": "https://www.suse.com/security/cve/CVE-2019-9456" }, { "category": "external", "summary": "SUSE Bug 1150025 for CVE-2019-9456", "url": "https://bugzilla.suse.com/1150025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-9456" }, { "cve": "CVE-2019-9506", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9506" } ], "notes": [ { "category": "general", "text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9506", "url": "https://www.suse.com/security/cve/CVE-2019-9506" }, { "category": "external", "summary": "SUSE Bug 1137865 for CVE-2019-9506", "url": "https://bugzilla.suse.com/1137865" }, { "category": "external", "summary": "SUSE Bug 1146042 for CVE-2019-9506", "url": "https://bugzilla.suse.com/1146042" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:17Z", "details": "moderate" } ], "title": "CVE-2019-9506" } ] }
suse-su-2019:2947-1
Vulnerability from csaf_suse
Published
2019-11-12 18:08
Modified
2019-11-12 18:08
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15-SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
Exception during Page Size Change, causing the CPU core to be non-functional.
The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
executable pages by splitting / merging huge pages into small pages as
needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
Transactional Memory support could be used to facilitate sidechannel
information leaks out of microarchitectural buffers, similar to the
previously described 'Microarchitectural Data Sampling' attack.
The Linux kernel was supplemented with the option to disable TSX operation
altogether (requiring CPU Microcode updates on older systems) and better
flushing of microarchitectural buffers (VERW).
The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251
- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
failed to add a port, which may have caused denial of service (bsc#1152685).
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
alloc_workqueue return value, leading to a NULL pointer dereference.
(bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
space. (bsc#1144903).
- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
libertas driver (bsc#1150465).
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
leading to a Buffer Overflow (bsc#1153158).
- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
meant that unprivileged users could create a raw socket (bsc#1152788).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- acpi: cppc: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- acpi: cppc: do not require the _PSD method (bsc#1051510).
- acpi: processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).
- alsa: firewire-motu: add support for MOTU 4pre (bsc#1111666).
- alsa: hda/hdmi: Do not report spurious jack state changes (bsc#1051510).
- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- alsa: hda/realtek: Add support for ALC623 (bsc#1051510).
- alsa: hda/realtek: Add support for ALC711 (bsc#1051510).
- alsa: hda/realtek: Check beep whitelist before assigning in all codecs (bsc#1051510).
- alsa: hda/realtek: Enable headset mic on Asus MJ401TA (bsc#1051510).
- alsa: hda/realtek: Fix 2 front mics of codec 0x623 (bsc#1051510).
- alsa: hda/realtek: Fix alienware headset mic (bsc#1051510).
- alsa: hda/realtek: PCI quirk for Medion E4254 (bsc#1051510).
- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- alsa: hda/sigmatel: remove unused variable 'stac9200_core_init' (bsc#1051510).
- alsa: hda: Add Elkhart Lake PCI ID (bsc#1051510).
- alsa: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).
- alsa: hda: Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).
- alsa: hda: Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).
- alsa: hda: Apply AMD controller workaround for Raven platform (bsc#1051510).
- alsa: hda: Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- alsa: hda: Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- alsa: hda: Expand pin_match function to match upcoming new tbls (bsc#1051510).
- alsa: hda: Flush interrupts on disabling (bsc#1051510).
- alsa: hda: Force runtime PM on Nvidia HDMI codecs (bsc#1051510).
- alsa: hda: Inform too slow responses (bsc#1051510).
- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- alsa: hda: Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).
- alsa: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).
- alsa: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).
- alsa: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- alsa: usb-audio: Clean up check_input_term() (bsc#1051510).
- alsa: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).
- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).
- alsa: usb-audio: Fix copy&paste error in the validator (bsc#1111666).
- alsa: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).
- alsa: usb-audio: More validations of descriptor units (bsc#1051510).
- alsa: usb-audio: Remove superfluous bLength checks (bsc#1051510).
- alsa: usb-audio: Simplify parse_audio_unit() (bsc#1051510).
- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- alsa: usb-audio: Unify audioformat release code (bsc#1051510).
- alsa: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).
- alsa: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).
- alsa: usb-audio: fix PCM device order (bsc#1051510).
- alsa: usb-audio: remove some dead code (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).
- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).
- asoc: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- asoc: intel: Fix use of potentially uninitialized variable (bsc#1051510).
- asoc: intel: nhlt: Fix debug print format (bsc#1051510).
- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).
- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).
- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).
- bpf: fix use after free in prog symbol exposure (bsc#1083647).
- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).
- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: af_alg: Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).
- crypto: af_alg: Initialize sg_num_bytes in error code path (bsc#1051510).
- crypto: af_alg: consolidation of duplicate code (bsc#1154737).
- crypto: af_alg: fix race accessing cipher request (bsc#1154737).
- crypto: af_alg: remove locking in async callback (bsc#1154737).
- crypto: af_alg: update correct dst SGL entry (bsc#1051510).
- crypto: af_alg: wait for data at beginning of recvmsg (bsc#1154737).
- crypto: algif: return error code when no data was processed (bsc#1154737).
- crypto: algif_aead: copy AAD from src to dst (bsc#1154737).
- crypto: algif_aead: fix reference counting of null skcipher (bsc#1154737).
- crypto: algif_aead: overhaul memory management (bsc#1154737).
- crypto: algif_aead: skip SGL entries with NULL page (bsc#1154737).
- crypto: algif_skcipher: overhaul memory management (bsc#1154737).
- crypto: talitos: fix missing break in switch statement (bsc#1142635).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: do not dma memory off of the stack (bsc#1152790).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).
- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)
- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).
- drm/amd/display: reprogram VM config when system resume (bsc#1111666).
- drm/amd/display: support spdif (bsc#1111666).
- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).
- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).
- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).
- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/atomic_helper: Allow DPMS On<->Off changes for unregistered connectors (bsc#1111666).
- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).
- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).
- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)
- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)
- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)
- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)
- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)
- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)
- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)
- drm/i915: Allow parsing of unsized batches (bsc#1135967)
- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).
- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)
- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).
- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)
- drm/i915: Remove Master tables from cmdparser (bsc#1135967)
- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)
- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).
- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)
- drm/mediatek: set DMA max segment size (bsc#1111666).
- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).
- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)
- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).
- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).
- drm/panel: check failure cases in the probe func (bsc#1111666).
- drm/panel: make drm_panel.h self-contained (bsc#1111666).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).
- drm/stm: attach gem fence to atomic state (bsc#1111666).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm: add __user attribute to ptr_to_compat() (bsc#1111666).
- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).
- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).
- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).
- efi: cper: print AER info of PCIe fatal error (bsc#1051510).
- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- hid: apple: Fix stuck function keys when using FN (bsc#1051510).
- hid: fix error message in hid_open_report() (bsc#1051510).
- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).
- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).
- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hso: fix NULL-deref on tty open (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core: do not wait on add_early_randomness() (git-fixes).
- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: ca8210: prevent memory leak (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- input: da9063: fix capability and drop KEY_SLEEP (bsc#1051510).
- input: synaptics-rmi4: avoid processing unknown IRQs (bsc#1051510).
- integrity: prevent deadlock during digsig verification (bsc#1090631).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).
- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).
- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).
- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kABI workaround for crypto/af_alg changes (bsc#1154737).
- kABI workaround for drm_connector.registered type changes (bsc#1111666).
- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel-binary.spec.in: Obsolete kgraft packages only when not building them.
- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578). Without this patch, /usr/src/linux-@VERSION@-@RELEASE_SHORT@-obj/x86_64/vanilla/.kernel-binary.spec.buildenv contained rpm %_smp_mflags in a line like export MAKE_ARGS=' --output-sync -j4' This made it hard to produce bit-identical builds.
- kernel-binary: check also bzImage on s390/s390x Starting with 4.19-rc1, uncompressed image is no longer built on s390x. If file 'image' is not found in arch/s390/boot after the build, try bzImage instead. For now, install bzImage under the name image-* until we know grub2 and our grub2 scripts can handle correct name.
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).
- kvm: ppc: book3s hv: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).
- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).
- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).
- lpfc: Add additional discovery log messages (bsc#1154521).
- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).
- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).
- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).
- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).
- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).
- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).
- lpfc: Make FW logging dynamically configurable (bsc#1154521).
- lpfc: Remove lock contention target write path (bsc#1154521).
- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).
- lpfc: Slight fast-path Performance optimizations (bsc#1154521).
- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).
- lpfc: fix coverity error of dereference after null check (bsc#1154521).
- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).
- mac80211: Reject malformed SSID elements (bsc#1051510).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- mac80211: fix txq null pointer dereference (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).
- md/raid0: fix warning message for parameter default_layout (bsc#1140090).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- misdn: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).
- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).
- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).
- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).
- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).
- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).
- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).
- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).
- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- net_sched: add policy validation for action attributes (networking-stable-19_09_30).
- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- nfsv4.1: backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix null pointer dereference (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).
- packaging: add support for riscv64
- pci: Correct pci=resource_alignment parameter example (bsc#1051510).
- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- pci: pm: Fix pci_power_up() (bsc#1051510).
- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).
- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- powerplay: Respect units on max dcfclk watermark (bsc#1111666).
- qed: iwarp: Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iwarp: Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iwarp: Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- qed: iwarp: fix uninitialized callback (bsc#1050536 bsc#1050545).
- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).
- r8152: Set macpassthru in reset_resume callback (bsc#1051510).
- rdma/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- rdma/hns: Add reset process for function-clear (bsc#1155061).
- rdma/hns: Remove the some magic number (bsc#1155061).
- rdma: Fix goto target to release the allocated memory (bsc#1050244).
- rds: Fix warning (bsc#1154848).
- rpm/config.sh: Enable livepatch.
- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.
- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.
- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.
- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)
- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.
- rpm/kernel-binary.spec.in: support partial rt debug config.
- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).
- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.
- rpm/mkspec: Correct tarball URL for rc kernels.
- rpm/mkspec: Make building DTBs optional.
- rpm/modflist: Simplify compression support.
- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.
- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with '.ko' which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize '.ko.xz' in addition to '.ko'.
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).
- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).
- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).
- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).
- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).
- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).
- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).
- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).
- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).
- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).
- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scripts/arch-symbols: add missing link.
- scsi: lpfc: Check queue pointer before use (bsc#1154242).
- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).
- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).
- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).
- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).
- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).
- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).
- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).
- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).
- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).
- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).
- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).
- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).
- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).
- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).
- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).
- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).
- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).
- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: lpfc: Update async event logging (bsc#1154521).
- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).
- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).
- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- skge: fix checksum byte order (networking-stable-19_09_30).
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).
- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).
- usb: ldusb: fix memleak on disconnect (bsc#1051510).
- usb: ldusb: fix read info leaks (bsc#1051510).
- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix memleak on disconnect (bsc#1051510).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).
- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usblp: fix use-after-free on disconnect (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).
- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames
SUSE-2019-2947,SUSE-SLE-Module-Basesystem-15-SP1-2019-2947,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2947,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2947,SUSE-SLE-Module-Legacy-15-SP1-2019-2947,SUSE-SLE-Module-Live-Patching-15-SP1-2019-2947,SUSE-SLE-Product-HA-15-SP1-2019-2947,SUSE-SLE-Product-WE-15-SP1-2019-2947
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15-SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- acpi: cppc: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- acpi: cppc: do not require the _PSD method (bsc#1051510).\n- acpi: processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- alsa: firewire-motu: add support for MOTU 4pre (bsc#1111666).\n- alsa: hda/hdmi: Do not report spurious jack state changes (bsc#1051510).\n- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- alsa: hda/realtek: Add support for ALC623 (bsc#1051510).\n- alsa: hda/realtek: Add support for ALC711 (bsc#1051510).\n- alsa: hda/realtek: Check beep whitelist before assigning in all codecs (bsc#1051510).\n- alsa: hda/realtek: Enable headset mic on Asus MJ401TA (bsc#1051510).\n- alsa: hda/realtek: Fix 2 front mics of codec 0x623 (bsc#1051510).\n- alsa: hda/realtek: Fix alienware headset mic (bsc#1051510).\n- alsa: hda/realtek: PCI quirk for Medion E4254 (bsc#1051510).\n- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- alsa: hda/sigmatel: remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- alsa: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- alsa: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- alsa: hda: Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- alsa: hda: Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).\n- alsa: hda: Apply AMD controller workaround for Raven platform (bsc#1051510).\n- alsa: hda: Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- alsa: hda: Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- alsa: hda: Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- alsa: hda: Flush interrupts on disabling (bsc#1051510).\n- alsa: hda: Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- alsa: hda: Inform too slow responses (bsc#1051510).\n- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- alsa: hda: Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- alsa: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- alsa: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).\n- alsa: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- alsa: usb-audio: Clean up check_input_term() (bsc#1051510).\n- alsa: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).\n- alsa: usb-audio: Fix copy\u0026paste error in the validator (bsc#1111666).\n- alsa: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- alsa: usb-audio: More validations of descriptor units (bsc#1051510).\n- alsa: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- alsa: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- alsa: usb-audio: Unify audioformat release code (bsc#1051510).\n- alsa: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- alsa: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- alsa: usb-audio: fix PCM device order (bsc#1051510).\n- alsa: usb-audio: remove some dead code (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).\n- asoc: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- asoc: intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- asoc: intel: nhlt: Fix debug print format (bsc#1051510).\n- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).\n- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg: Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg: Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg: consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg: fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg: remove locking in async callback (bsc#1154737).\n- crypto: af_alg: update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg: wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif: return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead: copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead: fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead: overhaul memory management (bsc#1154737).\n- crypto: algif_aead: skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher: overhaul memory management (bsc#1154737).\n- crypto: talitos: fix missing break in switch statement (bsc#1142635).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On\u003c-\u003eOff changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- hid: apple: Fix stuck function keys when using FN (bsc#1051510).\n- hid: fix error message in hid_open_report() (bsc#1051510).\n- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core: do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- input: da9063: fix capability and drop KEY_SLEEP (bsc#1051510).\n- input: synaptics-rmi4: avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-binary.spec.in: Obsolete kgraft packages only when not building them.\n- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578). Without this patch, /usr/src/linux-@VERSION@-@RELEASE_SHORT@-obj/x86_64/vanilla/.kernel-binary.spec.buildenv contained rpm %_smp_mflags in a line like export MAKE_ARGS=\u0027 --output-sync -j4\u0027 This made it hard to produce bit-identical builds.\n- kernel-binary: check also bzImage on s390/s390x Starting with 4.19-rc1, uncompressed image is no longer built on s390x. If file \u0027image\u0027 is not found in arch/s390/boot after the build, try bzImage instead. For now, install bzImage under the name image-* until we know grub2 and our grub2 scripts can handle correct name.\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: ppc: book3s hv: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- misdn: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).\n- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- nfsv4.1: backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- pci: Correct pci=resource_alignment parameter example (bsc#1051510).\n- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- pci: pm: Fix pci_power_up() (bsc#1051510).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- qed: iwarp: Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iwarp: Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iwarp: Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qed: iwarp: fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rdma/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- rdma/hns: Add reset process for function-clear (bsc#1155061).\n- rdma/hns: Remove the some magic number (bsc#1155061).\n- rdma: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- rpm/config.sh: Enable livepatch.\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).\n- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).\n- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).\n- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).\n- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).\n- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2947,SUSE-SLE-Module-Basesystem-15-SP1-2019-2947,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2947,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2947,SUSE-SLE-Module-Legacy-15-SP1-2019-2947,SUSE-SLE-Module-Live-Patching-15-SP1-2019-2947,SUSE-SLE-Product-HA-15-SP1-2019-2947,SUSE-SLE-Product-WE-15-SP1-2019-2947", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2947-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2947-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2947-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1082635", "url": "https://bugzilla.suse.com/1082635" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1090631", "url": "https://bugzilla.suse.com/1090631" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1096254", "url": "https://bugzilla.suse.com/1096254" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098291", "url": "https://bugzilla.suse.com/1098291" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113994", "url": "https://bugzilla.suse.com/1113994" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1119461", "url": "https://bugzilla.suse.com/1119461" }, { "category": "self", "summary": "SUSE Bug 1119465", "url": "https://bugzilla.suse.com/1119465" }, { "category": "self", "summary": "SUSE Bug 1123034", "url": "https://bugzilla.suse.com/1123034" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1133140", "url": "https://bugzilla.suse.com/1133140" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135854", "url": "https://bugzilla.suse.com/1135854" }, { "category": "self", "summary": "SUSE Bug 1135873", "url": "https://bugzilla.suse.com/1135873" }, { "category": "self", "summary": "SUSE Bug 1135967", "url": "https://bugzilla.suse.com/1135967" }, { "category": "self", "summary": "SUSE Bug 1137040", "url": "https://bugzilla.suse.com/1137040" }, { "category": "self", "summary": "SUSE Bug 1137799", "url": "https://bugzilla.suse.com/1137799" }, { "category": "self", "summary": "SUSE Bug 1137861", "url": "https://bugzilla.suse.com/1137861" }, { "category": "self", "summary": "SUSE Bug 1138190", "url": "https://bugzilla.suse.com/1138190" }, { "category": "self", "summary": "SUSE Bug 1139073", "url": "https://bugzilla.suse.com/1139073" }, { "category": "self", "summary": "SUSE Bug 1140090", "url": "https://bugzilla.suse.com/1140090" }, { "category": "self", "summary": "SUSE Bug 1140729", "url": "https://bugzilla.suse.com/1140729" }, { "category": "self", "summary": "SUSE Bug 1140845", "url": "https://bugzilla.suse.com/1140845" }, { "category": "self", "summary": "SUSE Bug 1140883", "url": "https://bugzilla.suse.com/1140883" }, { "category": "self", "summary": "SUSE Bug 1141600", "url": "https://bugzilla.suse.com/1141600" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142667", "url": "https://bugzilla.suse.com/1142667" }, { "category": "self", "summary": "SUSE Bug 1143706", "url": "https://bugzilla.suse.com/1143706" }, { "category": "self", "summary": "SUSE Bug 1144338", "url": "https://bugzilla.suse.com/1144338" }, { "category": "self", "summary": "SUSE Bug 1144375", "url": "https://bugzilla.suse.com/1144375" }, { "category": "self", "summary": "SUSE Bug 1144449", "url": "https://bugzilla.suse.com/1144449" }, { "category": "self", "summary": "SUSE Bug 1144903", "url": "https://bugzilla.suse.com/1144903" }, { "category": "self", "summary": "SUSE Bug 1145099", "url": "https://bugzilla.suse.com/1145099" }, { "category": "self", "summary": "SUSE Bug 1146612", "url": "https://bugzilla.suse.com/1146612" }, { "category": "self", "summary": "SUSE Bug 1148410", "url": "https://bugzilla.suse.com/1148410" }, { "category": "self", "summary": "SUSE Bug 1149119", "url": "https://bugzilla.suse.com/1149119" }, { "category": "self", "summary": "SUSE Bug 1149853", "url": "https://bugzilla.suse.com/1149853" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150457", "url": "https://bugzilla.suse.com/1150457" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150875", "url": "https://bugzilla.suse.com/1150875" }, { "category": "self", "summary": "SUSE Bug 1151508", "url": "https://bugzilla.suse.com/1151508" }, { "category": "self", "summary": "SUSE Bug 1151807", "url": "https://bugzilla.suse.com/1151807" }, { "category": "self", "summary": "SUSE Bug 1152033", "url": "https://bugzilla.suse.com/1152033" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1152665", "url": "https://bugzilla.suse.com/1152665" }, { "category": "self", "summary": "SUSE Bug 1152685", "url": "https://bugzilla.suse.com/1152685" }, { "category": "self", "summary": "SUSE Bug 1152696", "url": "https://bugzilla.suse.com/1152696" }, { "category": "self", "summary": "SUSE Bug 1152697", "url": "https://bugzilla.suse.com/1152697" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1152790", "url": "https://bugzilla.suse.com/1152790" }, { "category": "self", "summary": "SUSE Bug 1152791", "url": "https://bugzilla.suse.com/1152791" }, { "category": "self", "summary": "SUSE Bug 1153112", "url": "https://bugzilla.suse.com/1153112" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153236", "url": "https://bugzilla.suse.com/1153236" }, { "category": "self", "summary": "SUSE Bug 1153263", "url": "https://bugzilla.suse.com/1153263" }, { "category": "self", "summary": "SUSE Bug 1153476", "url": "https://bugzilla.suse.com/1153476" }, { "category": "self", "summary": "SUSE Bug 1153509", "url": "https://bugzilla.suse.com/1153509" }, { "category": "self", "summary": "SUSE Bug 1153607", "url": "https://bugzilla.suse.com/1153607" }, { "category": "self", "summary": "SUSE Bug 1153646", "url": "https://bugzilla.suse.com/1153646" }, { "category": "self", "summary": "SUSE Bug 1153681", "url": "https://bugzilla.suse.com/1153681" }, { "category": "self", "summary": "SUSE Bug 1153713", "url": "https://bugzilla.suse.com/1153713" }, { "category": "self", "summary": "SUSE Bug 1153717", "url": "https://bugzilla.suse.com/1153717" }, { "category": "self", "summary": "SUSE Bug 1153718", "url": "https://bugzilla.suse.com/1153718" }, { "category": "self", "summary": "SUSE Bug 1153719", "url": "https://bugzilla.suse.com/1153719" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1153969", "url": "https://bugzilla.suse.com/1153969" }, { "category": "self", "summary": "SUSE Bug 1154108", "url": "https://bugzilla.suse.com/1154108" }, { "category": "self", "summary": "SUSE Bug 1154189", "url": "https://bugzilla.suse.com/1154189" }, { "category": "self", "summary": "SUSE Bug 1154242", "url": "https://bugzilla.suse.com/1154242" }, { "category": "self", "summary": "SUSE Bug 1154268", "url": "https://bugzilla.suse.com/1154268" }, { "category": "self", "summary": "SUSE Bug 1154354", "url": "https://bugzilla.suse.com/1154354" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1154521", "url": "https://bugzilla.suse.com/1154521" }, { "category": "self", "summary": "SUSE Bug 1154578", "url": "https://bugzilla.suse.com/1154578" }, { "category": "self", "summary": "SUSE Bug 1154607", "url": "https://bugzilla.suse.com/1154607" }, { "category": "self", "summary": "SUSE Bug 1154608", "url": "https://bugzilla.suse.com/1154608" }, { "category": "self", "summary": "SUSE Bug 1154610", "url": "https://bugzilla.suse.com/1154610" }, { "category": "self", "summary": "SUSE Bug 1154611", "url": "https://bugzilla.suse.com/1154611" }, { "category": "self", "summary": "SUSE Bug 1154651", "url": "https://bugzilla.suse.com/1154651" }, { "category": "self", "summary": "SUSE Bug 1154737", "url": "https://bugzilla.suse.com/1154737" }, { "category": "self", "summary": "SUSE Bug 1154747", "url": "https://bugzilla.suse.com/1154747" }, { "category": "self", "summary": "SUSE Bug 1154848", "url": "https://bugzilla.suse.com/1154848" }, { "category": "self", "summary": "SUSE Bug 1154858", "url": "https://bugzilla.suse.com/1154858" }, { "category": "self", "summary": "SUSE Bug 1154905", "url": "https://bugzilla.suse.com/1154905" }, { "category": "self", "summary": "SUSE Bug 1154956", "url": "https://bugzilla.suse.com/1154956" }, { "category": "self", "summary": "SUSE Bug 1155061", "url": "https://bugzilla.suse.com/1155061" }, { "category": "self", "summary": "SUSE Bug 1155178", "url": "https://bugzilla.suse.com/1155178" }, { "category": "self", "summary": "SUSE Bug 1155179", "url": "https://bugzilla.suse.com/1155179" }, { "category": "self", "summary": "SUSE Bug 1155184", "url": "https://bugzilla.suse.com/1155184" }, { "category": "self", "summary": "SUSE Bug 1155186", "url": "https://bugzilla.suse.com/1155186" }, { "category": "self", "summary": "SUSE Bug 1155671", "url": "https://bugzilla.suse.com/1155671" }, { "category": "self", "summary": "SUSE Bug 802154", "url": "https://bugzilla.suse.com/802154" }, { "category": "self", "summary": "SUSE Bug 814594", "url": "https://bugzilla.suse.com/814594" }, { "category": "self", "summary": "SUSE Bug 919448", "url": "https://bugzilla.suse.com/919448" }, { "category": "self", "summary": "SUSE Bug 987367", "url": "https://bugzilla.suse.com/987367" }, { "category": "self", "summary": "SUSE Bug 998153", "url": "https://bugzilla.suse.com/998153" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12207 page", "url": "https://www.suse.com/security/cve/CVE-2018-12207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11135 page", "url": "https://www.suse.com/security/cve/CVE-2019-11135/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16233 page", "url": "https://www.suse.com/security/cve/CVE-2019-16233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16995 page", "url": "https://www.suse.com/security/cve/CVE-2019-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-11-12T18:08:00Z", "generator": { "date": "2019-11-12T18:08:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2947-1", "initial_release_date": "2019-11-12T18:08:00Z", "revision_history": [ { "date": "2019-11-12T18:08:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.26.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.26.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.26.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.26.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.26.1.aarch64", "product_id": "kernel-default-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.26.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.26.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.26.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.26.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.26.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.26.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.26.1.aarch64", "product_id": "kernel-syms-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.26.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.26.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.26.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.26.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.26.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.26.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.26.1.noarch", "product_id": "kernel-devel-4.12.14-197.26.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.26.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.26.1.noarch", "product_id": "kernel-docs-4.12.14-197.26.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.26.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.26.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.26.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.26.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.26.1.noarch", "product_id": "kernel-macros-4.12.14-197.26.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.26.1.noarch", "product": { "name": "kernel-source-4.12.14-197.26.1.noarch", "product_id": "kernel-source-4.12.14-197.26.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.26.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.26.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.26.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.26.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.26.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.26.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.26.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.26.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.26.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.26.1.ppc64le", "product_id": "kernel-default-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.26.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.26.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.26.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.26.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.26.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.26.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.26.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.26.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.26.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.26.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.26.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.26.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.26.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.26.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.26.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.26.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.26.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.26.1.s390x", "product": { "name": "kernel-default-4.12.14-197.26.1.s390x", "product_id": "kernel-default-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.26.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.26.1.s390x", "product_id": "kernel-default-base-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.26.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.26.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.26.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.26.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.26.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.26.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.26.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.26.1.s390x", "product_id": "kernel-default-man-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.26.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.26.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.26.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.26.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.26.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.26.1.s390x", "product_id": "kernel-syms-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.26.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.26.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.26.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.26.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.26.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.26.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.26.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.26.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.26.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.26.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.26.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.26.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.26.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.26.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.26.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.26.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.26.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.26.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.26.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.26.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.26.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.26.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.26.1.x86_64", "product_id": "kernel-debug-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.26.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.26.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.26.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.26.1.x86_64", "product_id": "kernel-default-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.26.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.26.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.26.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.26.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.26.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.26.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.26.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.26.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.26.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.26.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.26.1.x86_64", "product_id": "kernel-syms-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.26.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.26.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.26.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.26.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.26.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.26.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.26.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.26.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.26.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-197.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12207" } ], "notes": [ { "category": "general", "text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12207", "url": "https://www.suse.com/security/cve/CVE-2018-12207" }, { "category": "external", "summary": "SUSE Bug 1117665 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1117665" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1155812 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155812" }, { "category": "external", "summary": "SUSE Bug 1155817 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155817" }, { "category": "external", "summary": "SUSE Bug 1155945 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155945" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "moderate" } ], "title": "CVE-2018-12207" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "important" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-11135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11135" } ], "notes": [ { "category": "general", "text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11135", "url": "https://www.suse.com/security/cve/CVE-2019-11135" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152497 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152497" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1152506 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152506" }, { "category": "external", "summary": "SUSE Bug 1160120 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1160120" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "moderate" } ], "title": "CVE-2019-11135" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16233" } ], "notes": [ { "category": "general", "text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16233", "url": "https://www.suse.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "SUSE Bug 1150457 for CVE-2019-16233", "url": "https://bugzilla.suse.com/1150457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "low" } ], "title": "CVE-2019-16233" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16995" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16995", "url": "https://www.suse.com/security/cve/CVE-2019-16995" }, { "category": "external", "summary": "SUSE Bug 1152685 for CVE-2019-16995", "url": "https://bugzilla.suse.com/1152685" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "moderate" } ], "title": "CVE-2019-16995" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:08:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" } ] }
suse-su-2019:2946-1
Vulnerability from csaf_suse
Published
2019-11-28 19:49
Modified
2019-11-28 19:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.
The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.
More information can be found on https://www.suse.com/support/kb/doc/?id=7023735
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
Transactional Memory support could be used to facilitate sidechannel
information leaks out of microarchitectural buffers, similar to the previously
described 'Microarchitectural Data Sampling' attack.
The Linux kernel was supplemented with the option to disable TSX operation
altogether (requiring CPU Microcode updates on older systems) and better
flushing of microarchitectural buffers (VERW).
The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251
- CVE-2019-0154: Fix a local denial of service via read of unprotected i915 registers. (bsc#1135966)
- CVE-2019-0155: Fix privilege escalation in the i915 driver. Batch buffers from usermode could have escalated privileges via blitter command stream. (bsc#1135967)
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903).
- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port failed to add a port, which may have caused denial of service (bsc#1152685).
- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell libertas driver (bsc#1150465)
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE, leading to a Buffer Overflow (bsc#1153158).
- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which meant that unprivileged users could create a raw socket (bsc#1152788).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- acpi / CPPC: do not require the _PSD method (bsc#1051510).
- acpi / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- acpi: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).
- alsa: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- alsa: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- alsa: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- alsa: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- alsa: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- alsa: hda - Inform too slow responses (bsc#1051510).
- alsa: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).
- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).
- alsa: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- alsa: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).
- alsa: hda/realtek - Fix alienware headset mic (bsc#1051510).
- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- alsa: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- alsa: hda: Add Elkhart Lake pci ID (bsc#1051510).
- alsa: hda: Add Tigerlake/Jasperlake pci ID (bsc#1051510).
- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).
- alsa: hda: Flush interrupts on disabling (bsc#1051510).
- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).
- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).
- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).
- asoc: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- asoc: Intel: NHLT: Fix debug print format (bsc#1051510).
- asoc: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).
- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).
- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- boot: Sign non-x86 kernels when possible (boo#1134303)
- bpf: fix use after free in prog symbol exposure (bsc#1083647).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).
- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).
- crypto: af_alg - consolidation of duplicate code (bsc#1154737).
- crypto: af_alg - fix race accessing cipher request (bsc#1154737).
- crypto: af_alg - remove locking in async callback (bsc#1154737).
- crypto: af_alg - update correct dst SGL entry (bsc#1051510).
- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).
- crypto: algif - return error code when no data was processed (bsc#1154737).
- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).
- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).
- crypto: algif_aead - overhaul memory management (bsc#1154737).
- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).
- crypto: algif_skcipher - overhaul memory management (bsc#1154737).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).
- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)
- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)
- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)
- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)
- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)
- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)
- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)
- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)
- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)
- drm/i915: Allow parsing of unsized batches (bsc#1135967)
- drm/i915: Disable Secure Batches for gen6+
- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)
- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)
- drm/i915: Remove Master tables from cmdparser
- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)
- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).
- efi: cper: print AER info of pcie fatal error (bsc#1051510).
- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- hid: apple: Fix stuck function keys when using FN (bsc#1051510).
- hid: fix error message in hid_open_report() (bsc#1051510).
- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).
- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).
- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hso: fix NULL-deref on tty open (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: ca8210: prevent memory leak (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).
- integrity: prevent deadlock during digsig verification (bsc#1090631).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).
- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kABI workaround for crypto/af_alg changes (bsc#1154737).
- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578).
- kernel-binary: check also bzImage on s390/s390x Starting with 4.19-rc1, uncompressed image is no longer built on s390x.
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Recovery of shattered NX large pages (bsc#1117665, CVE-2018-12207).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mac80211: Reject malformed SSID elements (bsc#1051510).
- mac80211: accept deauth frames in ibSS mode (bsc#1051510).
- mac80211: fix txq null pointer dereference (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).
- md/raid0: fix warning message for parameter default_layout (bsc#1140090).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- mem: /dev/mem: Bail out upon SIGKILL (git-fixes).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).
- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).
- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).
- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).
- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).
- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).
- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).
- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- net_sched: add policy validation for action attributes (networking-stable-19_09_30).
- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- nfc: enforce CAP_NET_RAW for raw sockets (bsc#1152788 CVE-2019-17056).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- nfs: NFSv4 Check the return value of update_open_stateid (boo#1154189 bsc#1154747).
- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix null pointer dereference (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).
- packaging: add support for riscv64
- pci: Correct pci=resource_alignment parameter example (bsc#1051510).
- pci: PM: Fix pci_power_up() (bsc#1051510).
- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- pci: hv: Use bytes 4 and 5 from instance ID as the pci domain numbers (bsc#1153263).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).
- r8152: Set macpassthru in reset_resume callback (bsc#1051510).
- rdma/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- rdma: Fix goto target to release the allocated memory (bsc#1050244).
- rds: Fix warning (bsc#1154848).
- rpm/config.sh: Enable livepatch.
- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.
- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.
- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.
- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)
- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.
- rpm/kernel-binary.spec.in: support partial rt debug config.
- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).
- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.
- rpm/mkspec: Correct tarball URL for rc kernels.
- rpm/mkspec: Make building DTBs optional.
- rpm/modflist: Simplify compression support.
- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.
- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with '.ko' which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize '.ko.xz' in addition to '.ko'.
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).
- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).
- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scripts/arch-symbols: add missing link.
- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: fix a potential NULL pointer dereference (bsc#1150457 CVE-2019-16233).
- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- skge: fix checksum byte order (networking-stable-19_09_30).
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).
- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).
- usb: ldusb: fix memleak on disconnect (bsc#1051510).
- usb: ldusb: fix read info leaks (bsc#1051510).
- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix memleak on disconnect (bsc#1051510).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).
- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usblp: fix use-after-free on disconnect (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vfs: Make filldir[64]() verify the directory entry filename is valid (bsc#1144903).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).
- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- x86/tsx: Add config options to set tsx=on|off|auto (bsc#1139073, CVE-2019-11135).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames
SUSE-2019-2946,SUSE-SLE-Module-Basesystem-15-2019-2946,SUSE-SLE-Module-Development-Tools-15-2019-2946,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2946,SUSE-SLE-Module-Legacy-15-2019-2946,SUSE-SLE-Module-Live-Patching-15-2019-2946,SUSE-SLE-Product-HA-15-2019-2946,SUSE-SLE-Product-WE-15-2019-2946
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.\n\nThe Linux Kernel kvm hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.\nMore information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\nTransactional Memory support could be used to facilitate sidechannel\ninformation leaks out of microarchitectural buffers, similar to the previously\ndescribed \u0027Microarchitectural Data Sampling\u0027 attack.\n\nThe Linux kernel was supplemented with the option to disable TSX operation\naltogether (requiring CPU Microcode updates on older systems) and better\nflushing of microarchitectural buffers (VERW).\n\nThe set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-0154: Fix a local denial of service via read of unprotected i915 registers. (bsc#1135966)\n- CVE-2019-0155: Fix privilege escalation in the i915 driver. Batch buffers from usermode could have escalated privileges via blitter command stream. (bsc#1135967)\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150457).\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903).\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port failed to add a port, which may have caused denial of service (bsc#1152685).\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell libertas driver (bsc#1150465)\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150452).\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE, leading to a Buffer Overflow (bsc#1153158).\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which meant that unprivileged users could create a raw socket (bsc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- acpi / CPPC: do not require the _PSD method (bsc#1051510).\n- acpi / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- acpi: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- alsa: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- alsa: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- alsa: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- alsa: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- alsa: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- alsa: hda - Inform too slow responses (bsc#1051510).\n- alsa: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).\n- alsa: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- alsa: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- alsa: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- alsa: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- alsa: hda: Add Elkhart Lake pci ID (bsc#1051510).\n- alsa: hda: Add Tigerlake/Jasperlake pci ID (bsc#1051510).\n- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).\n- alsa: hda: Flush interrupts on disabling (bsc#1051510).\n- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).\n- asoc: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- asoc: Intel: NHLT: Fix debug print format (bsc#1051510).\n- asoc: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- boot: Sign non-x86 kernels when possible (boo#1134303)\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of pcie fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- hid: apple: Fix stuck function keys when using FN (bsc#1051510).\n- hid: fix error message in hid_open_report() (bsc#1051510).\n- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578).\n- kernel-binary: check also bzImage on s390/s390x Starting with 4.19-rc1, uncompressed image is no longer built on s390x.\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: mmu: Recovery of shattered NX large pages (bsc#1117665, CVE-2018-12207).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in ibSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- mem: /dev/mem: Bail out upon SIGKILL (git-fixes).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfc: enforce CAP_NET_RAW for raw sockets (bsc#1152788 CVE-2019-17056).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- nfs: NFSv4 Check the return value of update_open_stateid (boo#1154189 bsc#1154747).\n- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- pci: Correct pci=resource_alignment parameter example (bsc#1051510).\n- pci: PM: Fix pci_power_up() (bsc#1051510).\n- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- pci: hv: Use bytes 4 and 5 from instance ID as the pci domain numbers (bsc#1153263).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rdma/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- rdma: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- rpm/config.sh: Enable livepatch.\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fix a potential NULL pointer dereference (bsc#1150457 CVE-2019-16233).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vfs: Make filldir[64]() verify the directory entry filename is valid (bsc#1144903).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- x86/tsx: Add config options to set tsx=on|off|auto (bsc#1139073, CVE-2019-11135).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2946,SUSE-SLE-Module-Basesystem-15-2019-2946,SUSE-SLE-Module-Development-Tools-15-2019-2946,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2946,SUSE-SLE-Module-Legacy-15-2019-2946,SUSE-SLE-Module-Live-Patching-15-2019-2946,SUSE-SLE-Product-HA-15-2019-2946,SUSE-SLE-Product-WE-15-2019-2946", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2946-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2946-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2946-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1082635", "url": "https://bugzilla.suse.com/1082635" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1090631", "url": "https://bugzilla.suse.com/1090631" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1096254", "url": "https://bugzilla.suse.com/1096254" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098291", "url": "https://bugzilla.suse.com/1098291" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1119461", "url": "https://bugzilla.suse.com/1119461" }, { "category": "self", "summary": "SUSE Bug 1119465", "url": "https://bugzilla.suse.com/1119465" }, { "category": "self", "summary": "SUSE Bug 1123034", "url": "https://bugzilla.suse.com/1123034" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1133140", "url": "https://bugzilla.suse.com/1133140" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135854", "url": "https://bugzilla.suse.com/1135854" }, { "category": "self", "summary": "SUSE Bug 1135873", "url": "https://bugzilla.suse.com/1135873" }, { "category": "self", "summary": "SUSE Bug 1135966", "url": "https://bugzilla.suse.com/1135966" }, { "category": "self", "summary": "SUSE Bug 1135967", "url": "https://bugzilla.suse.com/1135967" }, { "category": "self", "summary": "SUSE Bug 1137040", "url": "https://bugzilla.suse.com/1137040" }, { "category": "self", "summary": "SUSE Bug 1137799", "url": "https://bugzilla.suse.com/1137799" }, { "category": "self", "summary": "SUSE Bug 1138190", "url": "https://bugzilla.suse.com/1138190" }, { "category": "self", "summary": "SUSE Bug 1139073", "url": "https://bugzilla.suse.com/1139073" }, { "category": "self", "summary": "SUSE Bug 1140090", "url": "https://bugzilla.suse.com/1140090" }, { "category": "self", "summary": "SUSE Bug 1140729", "url": "https://bugzilla.suse.com/1140729" }, { "category": "self", "summary": "SUSE Bug 1140845", "url": "https://bugzilla.suse.com/1140845" }, { "category": "self", "summary": "SUSE Bug 1140883", "url": "https://bugzilla.suse.com/1140883" }, { "category": "self", "summary": "SUSE Bug 1141600", "url": "https://bugzilla.suse.com/1141600" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142667", "url": "https://bugzilla.suse.com/1142667" }, { "category": "self", "summary": "SUSE Bug 1143706", "url": "https://bugzilla.suse.com/1143706" }, { "category": "self", "summary": "SUSE Bug 1144338", "url": "https://bugzilla.suse.com/1144338" }, { "category": "self", "summary": "SUSE Bug 1144375", "url": "https://bugzilla.suse.com/1144375" }, { "category": "self", "summary": "SUSE Bug 1144449", "url": "https://bugzilla.suse.com/1144449" }, { "category": "self", "summary": "SUSE Bug 1144903", "url": "https://bugzilla.suse.com/1144903" }, { "category": "self", "summary": "SUSE Bug 1145099", "url": "https://bugzilla.suse.com/1145099" }, { "category": "self", "summary": "SUSE Bug 1146612", "url": "https://bugzilla.suse.com/1146612" }, { "category": "self", "summary": "SUSE Bug 1148410", "url": "https://bugzilla.suse.com/1148410" }, { "category": "self", "summary": "SUSE Bug 1149119", "url": "https://bugzilla.suse.com/1149119" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150457", "url": "https://bugzilla.suse.com/1150457" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150875", "url": "https://bugzilla.suse.com/1150875" }, { "category": "self", "summary": "SUSE Bug 1151508", "url": "https://bugzilla.suse.com/1151508" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1152685", "url": "https://bugzilla.suse.com/1152685" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1152791", "url": "https://bugzilla.suse.com/1152791" }, { "category": "self", "summary": "SUSE Bug 1153112", "url": "https://bugzilla.suse.com/1153112" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153236", "url": "https://bugzilla.suse.com/1153236" }, { "category": "self", "summary": "SUSE Bug 1153263", "url": "https://bugzilla.suse.com/1153263" }, { "category": "self", "summary": "SUSE Bug 1153476", "url": "https://bugzilla.suse.com/1153476" }, { "category": "self", "summary": "SUSE Bug 1153509", "url": "https://bugzilla.suse.com/1153509" }, { "category": "self", "summary": "SUSE Bug 1153646", "url": "https://bugzilla.suse.com/1153646" }, { "category": "self", "summary": "SUSE Bug 1153713", "url": "https://bugzilla.suse.com/1153713" }, { "category": "self", "summary": "SUSE Bug 1153717", "url": "https://bugzilla.suse.com/1153717" }, { "category": "self", "summary": "SUSE Bug 1153718", "url": "https://bugzilla.suse.com/1153718" }, { "category": "self", "summary": "SUSE Bug 1153719", "url": "https://bugzilla.suse.com/1153719" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1153969", "url": "https://bugzilla.suse.com/1153969" }, { "category": "self", "summary": "SUSE Bug 1154108", "url": "https://bugzilla.suse.com/1154108" }, { "category": "self", "summary": "SUSE Bug 1154189", "url": "https://bugzilla.suse.com/1154189" }, { "category": "self", "summary": "SUSE Bug 1154354", "url": "https://bugzilla.suse.com/1154354" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1154578", "url": "https://bugzilla.suse.com/1154578" }, { "category": "self", "summary": "SUSE Bug 1154607", "url": "https://bugzilla.suse.com/1154607" }, { "category": "self", "summary": "SUSE Bug 1154608", "url": "https://bugzilla.suse.com/1154608" }, { "category": "self", "summary": "SUSE Bug 1154610", "url": "https://bugzilla.suse.com/1154610" }, { "category": "self", "summary": "SUSE Bug 1154611", "url": "https://bugzilla.suse.com/1154611" }, { "category": "self", "summary": "SUSE Bug 1154651", "url": "https://bugzilla.suse.com/1154651" }, { "category": "self", "summary": "SUSE Bug 1154737", "url": "https://bugzilla.suse.com/1154737" }, { "category": "self", "summary": "SUSE Bug 1154747", "url": "https://bugzilla.suse.com/1154747" }, { "category": "self", "summary": "SUSE Bug 1154848", "url": "https://bugzilla.suse.com/1154848" }, { "category": "self", "summary": "SUSE Bug 1154858", "url": "https://bugzilla.suse.com/1154858" }, { "category": "self", "summary": "SUSE Bug 1154905", "url": "https://bugzilla.suse.com/1154905" }, { "category": "self", "summary": "SUSE Bug 1155178", "url": "https://bugzilla.suse.com/1155178" }, { "category": "self", "summary": "SUSE Bug 1155179", "url": "https://bugzilla.suse.com/1155179" }, { "category": "self", "summary": "SUSE Bug 1155184", "url": "https://bugzilla.suse.com/1155184" }, { "category": "self", "summary": "SUSE Bug 1155186", "url": "https://bugzilla.suse.com/1155186" }, { "category": "self", "summary": "SUSE Bug 1155671", "url": "https://bugzilla.suse.com/1155671" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12207 page", "url": "https://www.suse.com/security/cve/CVE-2018-12207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-0154 page", "url": "https://www.suse.com/security/cve/CVE-2019-0154/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-0155 page", "url": "https://www.suse.com/security/cve/CVE-2019-0155/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11135 page", "url": "https://www.suse.com/security/cve/CVE-2019-11135/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16233 page", "url": "https://www.suse.com/security/cve/CVE-2019-16233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16995 page", "url": "https://www.suse.com/security/cve/CVE-2019-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-11-28T19:49:52Z", "generator": { "date": "2019-11-28T19:49:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2946-1", "initial_release_date": "2019-11-28T19:49:52Z", "revision_history": [ { "date": "2019-11-28T19:49:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.41.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.41.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.41.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.41.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.41.1.aarch64", "product_id": "kernel-default-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.41.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.41.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.41.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.41.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.41.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.41.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.41.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.41.1.aarch64", "product_id": "kernel-syms-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.41.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.41.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.41.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.41.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.41.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.41.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.41.1.noarch", "product_id": "kernel-devel-4.12.14-150.41.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.41.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.41.1.noarch", "product_id": "kernel-docs-4.12.14-150.41.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.41.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.41.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.41.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.41.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.41.1.noarch", "product_id": "kernel-macros-4.12.14-150.41.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.41.1.noarch", "product": { "name": "kernel-source-4.12.14-150.41.1.noarch", "product_id": "kernel-source-4.12.14-150.41.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.41.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.41.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.41.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.41.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.41.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.41.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.41.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.41.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.41.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.41.1.ppc64le", "product_id": "kernel-default-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.41.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.41.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.41.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.41.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.41.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.41.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.41.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.41.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.41.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.41.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.41.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.41.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.41.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.41.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.41.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.41.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.41.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.41.1.s390x", "product": { "name": "kernel-default-4.12.14-150.41.1.s390x", "product_id": "kernel-default-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.41.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.41.1.s390x", "product_id": "kernel-default-base-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.41.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.41.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.41.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.41.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.41.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.41.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.41.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.41.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.41.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.41.1.s390x", "product_id": "kernel-default-man-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.41.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.41.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.41.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.41.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.41.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.41.1.s390x", "product_id": "kernel-syms-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.41.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.41.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.41.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.41.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.41.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.41.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.41.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.41.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.41.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.41.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.41.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.41.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.41.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.41.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.41.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.41.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.41.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.41.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.41.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.41.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.41.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.41.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.41.1.x86_64", "product_id": "kernel-debug-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.41.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.41.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.41.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.41.1.x86_64", "product_id": "kernel-default-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.41.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.41.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.41.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.41.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.41.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.41.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.41.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.41.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.41.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.41.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.41.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.41.1.x86_64", "product_id": "kernel-syms-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.41.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.41.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.41.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.41.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.41.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.41.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.41.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.41.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.41.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-150.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12207" } ], "notes": [ { "category": "general", "text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12207", "url": "https://www.suse.com/security/cve/CVE-2018-12207" }, { "category": "external", "summary": "SUSE Bug 1117665 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1117665" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1155812 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155812" }, { "category": "external", "summary": "SUSE Bug 1155817 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155817" }, { "category": "external", "summary": "SUSE Bug 1155945 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155945" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "moderate" } ], "title": "CVE-2018-12207" }, { "cve": "CVE-2019-0154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-0154" } ], "notes": [ { "category": "general", "text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-0154", "url": "https://www.suse.com/security/cve/CVE-2019-0154" }, { "category": "external", "summary": "SUSE Bug 1135966 for CVE-2019-0154", "url": "https://bugzilla.suse.com/1135966" }, { "category": "external", "summary": "SUSE Bug 1181720 for CVE-2019-0154", "url": "https://bugzilla.suse.com/1181720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "important" } ], "title": "CVE-2019-0154" }, { "cve": "CVE-2019-0155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-0155" } ], "notes": [ { "category": "general", "text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-0155", "url": "https://www.suse.com/security/cve/CVE-2019-0155" }, { "category": "external", "summary": "SUSE Bug 1135966 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135966" }, { "category": "external", "summary": "SUSE Bug 1135967 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135967" }, { "category": "external", "summary": "SUSE Bug 1173663 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1173663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "important" } ], "title": "CVE-2019-0155" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "important" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-11135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11135" } ], "notes": [ { "category": "general", "text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11135", "url": "https://www.suse.com/security/cve/CVE-2019-11135" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152497 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152497" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1152506 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152506" }, { "category": "external", "summary": "SUSE Bug 1160120 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1160120" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "moderate" } ], "title": "CVE-2019-11135" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16233" } ], "notes": [ { "category": "general", "text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16233", "url": "https://www.suse.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "SUSE Bug 1150457 for CVE-2019-16233", "url": "https://bugzilla.suse.com/1150457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "low" } ], "title": "CVE-2019-16233" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16995" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16995", "url": "https://www.suse.com/security/cve/CVE-2019-16995" }, { "category": "external", "summary": "SUSE Bug 1152685 for CVE-2019-16995", "url": "https://bugzilla.suse.com/1152685" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "moderate" } ], "title": "CVE-2019-16995" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-28T19:49:52Z", "details": "moderate" } ], "title": "CVE-2019-17666" } ] }
suse-su-2019:2879-1
Vulnerability from csaf_suse
Published
2019-10-31 15:06
Modified
2019-10-31 15:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-18595: A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (bnc#1149555).
- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux kernel's KVM hypervisor implements the coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system (bnc#1151350).
- CVE-2019-15291: There was a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver (bnc#1146540).
- CVE-2019-9506: The Bluetooth BR/EDR specification up to and including version 5.1 permitted sufficiently low encryption key length and did not prevent an attacker from influencing the key length negotiation. This allowed practical brute-force attacks (aka 'KNOB') that could decrypt traffic and injected arbitrary ciphertext without the victim noticing (bnc#1137865 bnc#1146042).
- CVE-2019-16232: Fixed a NULL pointer dereference in drivers/net/wireless/marvell/libertas/if_sdio.c, which did not check the alloc_workqueue return value (bnc#1150465).
- CVE-2019-16234: Fixed a NULL pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c, which did not check the alloc_workqueue return value (bnc#1150452).
- CVE-2019-17056: Added enforcement of CAP_NET_RAW in llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module, the lack of which allowed unprivileged users to create a raw socket, aka CID-3a359798b176 (bnc#1152788).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
- CVE-2019-17666: Added an upper-bound check in rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c, the lack of which could have led to a buffer overflow (bnc#1154372).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- ACPI / CPPC: do not require the _PSD method (bsc#1051510).
- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- ACPI: custom_method: fix memory leaks (bsc#1051510).
- ACPI / PCI: fix acpi_pci_irq_enable() memory leak (bsc#1051510).
- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- ACPI / property: Fix acpi_graph_get_remote_endpoint() name in kerneldoc (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES='xz' in config.sh, then mkspec will pass it to the spec file.
- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).
- ALSA: aoa: onyx: always initialize register read value (bsc#1051510).
- ALSA: firewire-tascam: check intermediate state of clock status and retry (bsc#1051510).
- ALSA: firewire-tascam: handle error code when getting current source of clock (bsc#1051510).
- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).
- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- ALSA: hda: Flush interrupts on disabling (bsc#1051510).
- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- ALSA: hda - Inform too slow responses (bsc#1051510).
- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).
- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).
- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- ASoC: es8328: Fix copy-paste error in es8328_right_line_controls (bsc#1051510).
- ASoC: Intel: Baytrail: Fix implicit fallthrough warning (bsc#1051510).
- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).
- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- ASoC: sun4i-i2s: RX and TX counter registers are swapped (bsc#1051510).
- ASoC: wm8737: Fix copy-paste error in wm8737_snd_controls (bsc#1051510).
- ASoC: wm8988: fix typo in wm8988_right_line_controls (bsc#1051510).
- ath9k: dynack: fix possible deadlock in ath_dynack_node_{de}init (bsc#1051510).
- atm: iphase: Fix Spectre v1 vulnerability (networking-stable-19_08_08).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- bcma: fix incorrect update of BCMA_CORE_PCI_MDIO_DATA (bsc#1051510).
- blk-flush: do not run queue for requests bypassing flush (bsc#1137959).
- blk-flush: use blk_mq_request_bypass_insert() (bsc#1137959).
- blk-mq: do not allocate driver tag upfront for flush rq (bsc#1137959).
- blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling (bsc#1151610).
- blk-mq: insert rq with DONTPREP to hctx dispatch list when requeue (bsc#1137959).
- blk-mq: kABI fixes for blk-mq.h (bsc#1137959).
- blk-mq: move blk_mq_put_driver_tag*() into blk-mq.h (bsc#1137959).
- blk-mq: punt failed direct issue to dispatch list (bsc#1137959).
- blk-mq: put the driver tag of nxt rq before first one is requeued (bsc#1137959).
- blk-mq-sched: decide how to handle flush rq via RQF_FLUSH_SEQ (bsc#1137959).
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- block: fix timeout changes for legacy request drivers (bsc#1149446).
- block: kABI fixes for BLK_EH_DONE renaming (bsc#1142076).
- block: rename BLK_EH_NOT_HANDLED to BLK_EH_DONE (bsc#1142076).
- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Disable multi-cos feature (networking-stable-19_08_08).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bonding: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: fix use-after-free when using the tree modification log (bsc#1151891).
- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).
- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).
- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1152972).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- ceph: use ceph_evict_inode to cleanup inode's resource (bsc#1148133).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- clk: at91: fix update bit maps on CFG_MOR write (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: sunxi-ng: v3s: add missing clock slices for MMC2 module clocks (bsc#1051510).
- clk: sunxi-ng: v3s: add the missing PLL_DDR1 (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: caam - fix concurrency issue in givencrypt descriptor (bsc#1051510).
- crypto: caam - free resources in case caam_rng registration failed (bsc#1051510).
- crypto: cavium/zip - Add missing single_release() (bsc#1051510).
- crypto: ccp - Reduce maximum stack usage (bsc#1051510).
- crypto: qat - Silence smp_processor_id() warning (bsc#1051510).
- crypto: skcipher - Unmap pages after an external error (bsc#1051510).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- /dev/mem: Bail out upon SIGKILL (git-fixes).
- dmaengine: dw: platform: Switch to acpi_dma_controller_register() (bsc#1051510).
- dmaengine: iop-adma.c: fix printk format warning (bsc#1051510).
- drivers: thermal: int340x_thermal: Fix sysfs race condition (bsc#1051510).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm/i915: Fix various tracepoints for gen2 (bsc#1113722)
- drm/imx: Drop unused imx-ipuv3-crtc.o build (bsc#1113722)
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- EDAC/amd64: Decode syndrome before translating address (bsc#1114279).
- eeprom: at24: make spd world-readable again (git-fixes).
- ext4: fix warning inside ext4_convert_unwritten_extents_endio (bsc#1152025).
- ext4: set error return correctly when ext4_htree_store_dirent fails (bsc#1152024).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- Fix AMD IOMMU kABI (bsc#1154610).
- Fix kabi for: NFSv4: Fix OPEN / CLOSE race (git-fixes).
- Fix KVM kABI after x86 mmu backports (bsc#1117665).
- gpio: fix line flag validation in lineevent_create (bsc#1051510).
- gpio: fix line flag validation in linehandle_create (bsc#1051510).
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and blacklist (bsc#1051510).
- gpiolib: only check line handle flags once (bsc#1051510).
- gpio: Move gpiochip_lock/unlock_as_irq to gpio/driver.h (bsc#1051510).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- HID: apple: Fix stuck function keys when using FN (bsc#1051510).
- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).
- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwmon: (lm75) Fix write operations for negative temperatures (bsc#1051510).
- hwmon: (shtc1) fix shtc1 and shtw1 id mask (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ife: error out when nla attributes are empty (networking-stable-19_08_08).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: dac: ad5380: fix incorrect assignment to val (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- Input: elan_i2c - remove Lenovo Legion Y7000 PnpID (bsc#1051510).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- iommu/dma: Fix for dereferencing before null checking (bsc#1151667).
- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151671).
- ip6_tunnel: fix possible use-after-free on xmit (networking-stable-19_08_08).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6/addrconf: allow adding multicast addr if IFA_F_MCAUTOJOIN is set (networking-stable-19_08_28).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- isdn/capi: check message length in capi_write() (bsc#1051510).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kABI: media: em28xx: fix handler for vidioc_s_input() (bsc#1051510). fixes kABI
- kABI: media: em28xx: stop rewriting device's struct (bsc#1051510). fixes kABI
- kABI: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kABI/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- KVM: Convert kvm_lock to a mutex (bsc#1117665).
- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).
- KVM: PPC: Book3S: Fix incorrect guest-to-user-translation error handling (bsc#1061840).
- KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores (bsc#1061840).
- KVM: PPC: Book3S HV: Do not lose pending doorbell request on migration on P9 (bsc#1061840).
- KVM: PPC: Book3S HV: Do not push XIVE context when not using XIVE device (bsc#1061840).
- KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest (bsc#1061840).
- KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts (bsc#1061840).
- KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code (bsc#1061840).
- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP (bsc#1061840).
- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- KVM: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- KVM: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- leds: leds-lp5562 allow firmware files up to the maximum length (bsc#1051510).
- leds: trigger: gpio: GPIO 0 is valid (bsc#1051510).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- libertas_tf: Use correct channel range in lbtf_geo_init (bsc#1051510).
- libiscsi: do not try to bypass SCSI EH (bsc#1142076).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- livepatch: Nullify obj->mod in klp_module_coming()'s error path (bsc#1071995).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- mac80211: minstrel_ht: fix per-group max throughput rate initialization (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- md: do not report active array_state until after revalidate_disk() completes (git-fixes).
- md: only call set_in_sync() when it is expected to succeed (git-fixes).
- md/raid6: Set R5_ReadError when there is read failure on parity disk (git-fixes).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: atmel: atmel-isi: fix timeout value for stop streaming (bsc#1051510).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dib0700: fix link error for dibx000_i2c_set_speed (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: em28xx: fix handler for vidioc_s_input() (bsc#1051510).
- media: em28xx: stop rewriting device's struct (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: fdp1: Reduce FCP not found message level to debug (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: marvell-ccic: do not generate EOF on parallel bus (bsc#1051510).
- media: mc-device.c: do not memset __user pointer contents (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov6650: Fix sensor possibly not detected on probe (bsc#1051510).
- media: ov6650: Move v4l2_clk_get() to ov6650_video_probe() helper (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: replace strcpy() by strscpy() (bsc#1051510).
- media: Revert '[media] marvell-ccic: reset ccic phy when stop streaming for stability' (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: technisat-usb2: break out of loop at end of buffer (bsc#1051510).
- media: tm6000: double free if usb disconnect while streaming (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- media: vb2: Fix videobuf2 to map correct area (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mic: avoid statically declaring a 'struct device' (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- mmc: sdhci-msm: fix mutex while in spinlock (bsc#1142635).
- mmc: sdhci-of-arasan: Do now show error message in case of deffered probe (bsc#1119086).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI RCU Schedule Stall (bsc#1051510).
- mvpp2: refactor MTU change code (networking-stable-19_08_08).
- net: bridge: delete local fdb on device init failure (networking-stable-19_08_08).
- net: bridge: mcast: do not delete permanent entries when fast leave is enabled (networking-stable-19_08_08).
- net: fix ifindex collision during namespace removal (networking-stable-19_08_08).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).
- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5e: Only support tx/rx pause setting for port owner (networking-stable-19_08_21).
- net/mlx5e: Prevent encap flow counter update async to user query (networking-stable-19_08_08).
- net/mlx5e: Use flow keys dissector to parse packets for ARFS (networking-stable-19_08_21).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/mlx5: Use reversed order when unregister devices (networking-stable-19_08_08).
- net/packet: fix race in tpacket_snd() (networking-stable-19_08_21).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: sched: Fix a possible null-pointer dereference in dequeue_func() (networking-stable-19_08_08).
- net/smc: make sure EPOLLOUT is raised (networking-stable-19_08_28).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- NFS4: Fix v4.0 client state corruption when mount (git-fixes).
- nfsd: degraded slot-count more gracefully as allocation nears exhaustion (bsc#1150381).
- nfsd: Do not release the callback slot unless it was actually held (git-fixes).
- nfsd: Fix overflow causing non-working mounts on 1 TB machines (bsc#1150381).
- nfsd: fix performance-limiting session calculation (bsc#1150381).
- nfsd: give out fewer session slots as limit approaches (bsc#1150381).
- nfsd: handle drc over-allocation gracefully (bsc#1150381).
- nfsd: increase DRC cache limit (bsc#1150381).
- NFS: Do not interrupt file writeout due to fatal errors (git-fixes).
- NFS: Do not open code clearing of delegation state (git-fixes).
- NFS: Ensure O_DIRECT reports an error if the bytes read/written is 0 (git-fixes).
- NFS: Fix regression whereby fscache errors are appearing on 'nofsc' mounts (git-fixes).
- NFS: Forbid setting AF_INET6 to 'struct sockaddr_in'->sin_family (git-fixes).
- NFS: Refactor nfs_lookup_revalidate() (git-fixes).
- NFS: Remove redundant semicolon (git-fixes).
- NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter (git-fixes).
- NFSv4.1: Fix open stateid recovery (git-fixes).
- NFSv4.1: Only reap expired delegations (git-fixes).
- NFSv4: Check the return value of update_open_stateid() (git-fixes).
- NFSv4: Fix an Oops in nfs4_do_setattr (git-fixes).
- NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim() (git-fixes).
- NFSv4: Fix delegation state recovery (git-fixes).
- NFSv4: Fix lookup revalidate of regular files (git-fixes).
- NFSv4: Fix OPEN / CLOSE race (git-fixes).
- NFSv4: Handle the special Linux file open access mode (git-fixes).
- NFSv4: Only pass the delegation to setattr if we're sending a truncate (git-fixes).
- NFSv4/pnfs: Fix a page lock leak in nfs_pageio_resend() (git-fixes).
- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).
- null_blk: complete requests from ->timeout (bsc#1149446).
- null_blk: wire up timeouts (bsc#1149446).
- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).
- nvmem: Use the same permissions for eeprom as for nvmem (git-fixes).
- nvme-rdma: Allow DELETING state change failure in (bsc#1104967,).
- nvme-rdma: centralize admin/io queue teardown sequence (bsc#1142076).
- nvme-rdma: centralize controller setup sequence (bsc#1142076).
- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).
- nvme-rdma: fix timeout handler (bsc#1149446).
- nvme-rdma: stop admin queue before freeing it (bsc#1140155).
- nvme-rdma: support up to 4 segments of inline data (bsc#1142076).
- nvme-rdma: unquiesce queues when deleting the controller (bsc#1142076).
- nvme: remove ns sibling before clearing path (bsc#1140155).
- nvme: return BLK_EH_DONE from ->timeout (bsc#1142076).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).
- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- PCI: hv: Detect and fix Hyper-V PCI domain number collision (bsc#1150423).
- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- PCI: PM: Fix pci_power_up() (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: Disable clearing VBUS in over-current (bsc#1051510).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC227E to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- PM: sleep: Fix possible overflow in pm_system_cancel_wakeup() (bsc#1051510).
- PNFS fallback to MDS if no deviceid found (git-fixes).
- pNFS/flexfiles: Fix PTR_ERR() dereferences in ff_layout_track_ds_error (git-fixes).
- pNFS/flexfiles: Turn off soft RPC calls (git-fixes).
- powerpc/64: Make sys_switch_endian() traceable (bsc#1065729).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: Fix MADV_[FREE|DONTNEED] TLB flush miss problem with THP (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Fix memory hotplug section page table creation (bsc#1065729).
- powerpc/64s/radix: Fix memory hot-unplug page table split (bsc#1065729).
- powerpc/64s/radix: Implement _tlbie(l)_va_range flush functions (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Improve preempt handling in TLB code (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Improve TLB flushing for page table freeing (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Introduce local single page ceiling for TLB range flush (bsc#1055117 bsc#1152161 ltc#181664).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: Optimize flush_tlb_range (bsc#1152161 ltc#181664).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/book3s64/mm: Do not do tlbie fixup for some hardware revisions (bsc#1152161 ltc#181664).
- powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flag (bsc#1152161 ltc#181664).
- powerpc: bpf: Fix generation of load/store DW instructions (bsc#1065729).
- powerpc/bpf: use unsigned division instruction for 64-bit operations (bsc#1065729).
- powerpc: Drop page_is_ram() and walk_system_ram_range() (bsc#1065729).
- powerpc/irq: Do not WARN continuously in arch_local_irq_restore() (bsc#1065729).
- powerpc/irq: drop arch_early_irq_init() (bsc#1065729).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm: Fixup tlbie vs mtpidr/mtlpidr ordering issue on POWER9 (bsc#1152161 ltc#181664).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm/radix: Drop unneeded NULL check (bsc#1152161 ltc#181664).
- powerpc/mm/radix: implement LPID based TLB flushes to be used by KVM (bsc#1152161 ltc#181664).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/mm: Simplify page_is_ram by using memblock_is_memory (bsc#1065729).
- powerpc/mm: Use memblock API for PPC32 page_is_ram (bsc#1065729).
- powerpc/module64: Fix comment in R_PPC64_ENTRY handling (bsc#1065729).
- powerpc/powernv: Fix compile without CONFIG_TRACEPOINTS (bsc#1065729).
- powerpc/powernv/ioda2: Allocate TCE table levels on demand for default DMA window (bsc#1061840).
- powerpc/powernv/ioda: Fix race in TCE level allocation (bsc#1061840).
- powerpc/powernv: move OPAL call wrapper tracing and interrupt handling to C (bsc#1065729).
- powerpc/powernv/npu: Remove obsolete comment about TCE_KILL_INVAL_ALL (bsc#1065729).
- powerpc/pseries: Call H_BLOCK_REMOVE when supported (bsc#1109158).
- powerpc/pseries: Export maximum memory value (bsc#1122363).
- powerpc/pseries: Export raw per-CPU VPA data via debugfs ().
- powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt() (bsc#1065729).
- powerpc/pseries/memory-hotplug: Fix return value type of find_aa_index (bsc#1065729).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Read TLB Block Invalidate Characteristics (bsc#1109158).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/ptrace: Simplify vr_get/set() to avoid GCC warning (bsc#1148868).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- powerpc/xive: Fix bogus error code returned by OPAL (bsc#1065729).
- powerpc/xive: Implement get_irqchip_state method for XIVE to fix shutdown race (bsc#1065729).
- powerpc/xmon: Fix opcode being uninitialized in print_insn_powerpc (bsc#1065729).
- power: reset: gpio-restart: Fix typo when gpio reset is not found (bsc#1051510).
- power: supply: Init device wakeup after device_add() (bsc#1051510).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- ppp: Fix memory leak in ppp_write (git-fixes).
- printk: Do not lose last line in kmsg buffer dump (bsc#1152460).
- printk: fix printk_time race (bsc#1152466).
- printk/panic: Avoid deadlock in printk() after stopping CPUs by NMI (bsc#1148712).
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- qla2xxx: kABI fixes for v10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).
- qla2xxx: remove SGI SN2 support (bsc#1123034 bsc#1131304 bsc#1127988).
- quota: fix wrong condition in is_quota_modification() (bsc#1152026).
- r8152: Set memory to all 0xFFs on failed reg reads (bsc#1051510).
- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- RDMA: Fix goto target to release the allocated memory (bsc#1050244).
- regulator: lm363x: Fix off-by-one n_voltages for lm3632 ldo_vpos/ldo_vneg (bsc#1051510).
- Revert 'mwifiex: fix system hang problem after resume' (bsc#1051510).
- Revert 'Revert 'rpm/kernel-binary.spec.in: rename kGraft to KLP ()'' This reverts commit 468af43c8fd8509820798b6d8ed363fc417ca939 Should get this rename again with next SLE15 merge.
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add new FW dump template entry types (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add pci function reset support (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add protection mask module parameters (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Add support for setting port speed (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Allow NVMe IO to resume with short cable pull (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: allow session delete to finish before create (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Avoid PCI IRQ affinity mapping when multiqueue is not supported (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: avoid printf format warning (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Avoid that Coverity complains about dereferencing a NULL rport pointer (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Avoid that lockdep complains about unsafe locking in tcm_qla2xxx_close_session() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Avoid that qla2x00_mem_free() crashes if called twice (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change abort wait_loop from msleep to wait_event_timeout (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change data_dsd into an array (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change default ZIO threshold (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: check for kstrtol() failure (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Check the size of firmware data structures at compile time (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Cleanup fcport memory to prevent leak (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if a command is released that is owned by the firmware (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if a soft reset fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if sp->done() is not called from the completion path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Complain loudly about reference count underflow (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Correct error handling during initialization failures (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: deadlock by configfs_depend_item (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare local symbols static (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare qla24xx_build_scsi_crc_2_iocbs() static (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare qla2x00_find_new_loop_id() static (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Do not corrupt vha->plogi_ack_list (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Downgrade driver to 10.01.00.19-k There are upstream bug reports against 10.01.00.19-k which haven't been resolved. Also the newer version failed to get a proper review. For time being it's better to got with the older version and do not introduce new bugs.
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix abort timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a qla24xx_enable_msix() error path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a recently introduced kernel warning (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix a small typo in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix comment alignment in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix different size DMA Alloc/Unmap (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix DMA unmap leak (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix driver unload when FC-NVMe LUNs are connected (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: fix fcport null pointer access (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix formatting of pointer types (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix fw dump corruption (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix fw options handle eh_bus_reset() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix gnl.l memory leak on adapter init failure (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix hang in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix hardirq-unsafe locking (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix hardlockup in abort command during driver remove (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix kernel crash after disconnecting NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix N2N link reset (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix Nport ID display value (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix NULL pointer crash due to stale CPUID (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix NVME cmd and LS cmd timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix NVMe port discovery after a short device port loss (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix possible fcport null-pointer dereferences (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix premature timer expiration (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix race conditions in the code for aborting SCSI commands (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix Relogin to prevent modifying scan_state flag (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix session cleanup hang (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: fix spelling mistake 'alredy' -> 'already' (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: fix spelling mistake 'initializatin' -> 'initialization' (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix SRB allocation flag to avoid sleeping in IRQ context (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix stale session (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix stuck login session (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Fix use-after-free issues in qla2xxx_qpair_sp_free_dma() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: flush IO on chip reset or sess delete (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Further limit FLASH region write access from SysFS (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Include the <asm/unaligned.h> header file from qla_dsd.h (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Increase the max_sgl_segments to 1024 (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Increase the size of the mailbox arrays from 4 to 8 (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Insert spaces where required (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Leave a blank line after declarations (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Log the status code if a firmware command fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qla24xx_async_abort_cmd() static (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qla2x00_mem_free() easier to verify (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qla2x00_process_response_queue() easier to read (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Modify NVMe include directives (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: move IO flush to the front of NVME rport unregistration (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move marker request behind QPair (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move qla2x00_clear_loop_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move qla2x00_is_reserved_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move qla2x00_set_fcport_state() from a .h into a .c file (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move qla2x00_set_reserved_loop_ids() definition (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move the <linux/io-64-nonatomic-lo-hi.h> include directive (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Move the port_state_str definition from a .h to a .c file (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: on session delete, return nvme cmd (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Pass little-endian values to the firmware (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Prevent memory leak for CT req/rsp allocation (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: qla2x00_alloc_fw_dump: set ha->eft (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reduce the number of forward declarations (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reject EH_{abort|device_reset|target_request} (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove a comment that refers to the SCSI host lock (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove dead code (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: remove double assignment in qla2x00_update_fcport (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove FW default template (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove qla_tgt_cmd.data_work and qla_tgt_cmd.data_work_free (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove qla_tgt_cmd.released (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove set but not used variable 'ptr_dma' (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove the fcport test from qla_nvme_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove two superfluous casts (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove two superfluous tests (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove unnecessary locking from the target code (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove unnecessary null check (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove useless set memory to zero use memset() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Replace vmalloc + memset with vzalloc (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Reset the FCF_ASYNC_{SENT|ACTIVE} flags (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Restore FAWWPN of Physical Port only for loop down (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Retry fabric Scan on IOCB queue full (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set the qpair in SRB to NULL when SRB is released (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Set the SCSI command result before calling the command done (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Silence fwdump template message (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Silence Successful ELS IOCB message (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify a debug statement (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify conditional check again (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Simplify qlt_send_term_imm_notif() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Skip FW dump on LOOP initialization error (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: target: Fix offline port handling and host reset handling (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Uninline qla2x00_init_timer() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Unregister resources in the opposite order of the registration order (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.00.00.13-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.16-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Update flash read/write routine (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use an on-stack completion in qla24xx_control_vp() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use ARRAY_SIZE() in the definition of QLA_LAST_SPEED (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use common update-firmware-options routine for ISP27xx+ (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use complete switch scan for RSCN events (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use Correct index for Q-Pair array (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use get/put_unaligned where appropriate (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use __le64 instead of uint32_t for sending DMA addresses to firmware (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use mutex protection during qla2x00_sysfs_read_fw_dump() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Use tabs to indent code (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: scsi_dh_rdac: zero cdb in send_mode_select() (bsc#1149313).
- scsi: scsi_transport_fc: nvme: display FC-NVMe port roles (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- scsi: tcm_qla2xxx: Minimize #include directives (bsc#1123034 bsc#1131304 bsc#1127988).
- scsi_transport_fc: complete requests from ->timeout (bsc#1142076).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: fix the transport error_count check (networking-stable-19_08_21).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- secure boot lockdown: Fix-up backport of /dev/mem access restriction The upstream-submitted patch set has evolved over time, align our patches (contents and description) to reflect the current status as far as /dev/mem access is concerned.
- Sign non-x86 kernels when possible (boo#1134303)
- sky2: Disable MSI on yet another ASUS boards (P6Xxxx) (bsc#1051510).
- slip: make slhc_free() silently accept an error pointer (bsc#1051510).
- slip: sl_alloc(): remove unused parameter 'dev_t line' (bsc#1051510).
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- SUNRPC fix regression in umount of a secure mount (git-fixes).
- SUNRPC: Handle connection breakages correctly in call_status() (git-fixes).
- SUNRPC/nfs: Fix return value for nfs4_callback_compound() (git-fixes).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: make sure EPOLLOUT wont be missed (networking-stable-19_08_28).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- team: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts (bsc#1082555).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: usbcore: Fix slab-out-of-bounds bug during device reset (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- video: ssd1307fb: Start page range at page_offset (bsc#1113722)
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16h (bsc#1114279).
- x86/fpu: Add FPU state copying quirk to handle XRSTOR failure on Intel Skylake CPUs (bsc#1151955).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- x86/tls: Fix possible spectre-v1 in do_get_thread_area() (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/netback: Reset nr_frags before freeing skb (networking-stable-19_08_21).
- xen-netfront: do not assume sk_buff_head list is empty in error handling (bsc#1065600).
- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames
SUSE-2019-2879,SUSE-SLE-DESKTOP-12-SP4-2019-2879,SUSE-SLE-HA-12-SP4-2019-2879,SUSE-SLE-Live-Patching-12-SP4-2019-2879,SUSE-SLE-SDK-12-SP4-2019-2879,SUSE-SLE-SERVER-12-SP4-2019-2879,SUSE-SLE-WE-12-SP4-2019-2879
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-18595: A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (bnc#1149555).\n- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux kernel\u0027s KVM hypervisor implements the coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system (bnc#1151350).\n- CVE-2019-15291: There was a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver (bnc#1146540).\n- CVE-2019-9506: The Bluetooth BR/EDR specification up to and including version 5.1 permitted sufficiently low encryption key length and did not prevent an attacker from influencing the key length negotiation. This allowed practical brute-force attacks (aka \u0027KNOB\u0027) that could decrypt traffic and injected arbitrary ciphertext without the victim noticing (bnc#1137865 bnc#1146042).\n- CVE-2019-16232: Fixed a NULL pointer dereference in drivers/net/wireless/marvell/libertas/if_sdio.c, which did not check the alloc_workqueue return value (bnc#1150465).\n- CVE-2019-16234: Fixed a NULL pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c, which did not check the alloc_workqueue return value (bnc#1150452).\n- CVE-2019-17056: Added enforcement of CAP_NET_RAW in llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module, the lack of which allowed unprivileged users to create a raw socket, aka CID-3a359798b176 (bnc#1152788).\n- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).\n- CVE-2019-17666: Added an upper-bound check in rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c, the lack of which could have led to a buffer overflow (bnc#1154372).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI: custom_method: fix memory leaks (bsc#1051510).\n- ACPI / PCI: fix acpi_pci_irq_enable() memory leak (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- ACPI / property: Fix acpi_graph_get_remote_endpoint() name in kerneldoc (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES=\u0027xz\u0027 in config.sh, then mkspec will pass it to the spec file.\n- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).\n- ALSA: aoa: onyx: always initialize register read value (bsc#1051510).\n- ALSA: firewire-tascam: check intermediate state of clock status and retry (bsc#1051510).\n- ALSA: firewire-tascam: handle error code when getting current source of clock (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: es8328: Fix copy-paste error in es8328_right_line_controls (bsc#1051510).\n- ASoC: Intel: Baytrail: Fix implicit fallthrough warning (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- ASoC: sun4i-i2s: RX and TX counter registers are swapped (bsc#1051510).\n- ASoC: wm8737: Fix copy-paste error in wm8737_snd_controls (bsc#1051510).\n- ASoC: wm8988: fix typo in wm8988_right_line_controls (bsc#1051510).\n- ath9k: dynack: fix possible deadlock in ath_dynack_node_{de}init (bsc#1051510).\n- atm: iphase: Fix Spectre v1 vulnerability (networking-stable-19_08_08).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- bcma: fix incorrect update of BCMA_CORE_PCI_MDIO_DATA (bsc#1051510).\n- blk-flush: do not run queue for requests bypassing flush (bsc#1137959).\n- blk-flush: use blk_mq_request_bypass_insert() (bsc#1137959).\n- blk-mq: do not allocate driver tag upfront for flush rq (bsc#1137959).\n- blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling (bsc#1151610).\n- blk-mq: insert rq with DONTPREP to hctx dispatch list when requeue (bsc#1137959).\n- blk-mq: kABI fixes for blk-mq.h (bsc#1137959).\n- blk-mq: move blk_mq_put_driver_tag*() into blk-mq.h (bsc#1137959).\n- blk-mq: punt failed direct issue to dispatch list (bsc#1137959).\n- blk-mq: put the driver tag of nxt rq before first one is requeued (bsc#1137959).\n- blk-mq-sched: decide how to handle flush rq via RQF_FLUSH_SEQ (bsc#1137959).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: fix timeout changes for legacy request drivers (bsc#1149446).\n- block: kABI fixes for BLK_EH_DONE renaming (bsc#1142076).\n- block: rename BLK_EH_NOT_HANDLED to BLK_EH_DONE (bsc#1142076).\n- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Disable multi-cos feature (networking-stable-19_08_08).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bonding: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: fix use-after-free when using the tree modification log (bsc#1151891).\n- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).\n- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).\n- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1152972).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- ceph: use ceph_evict_inode to cleanup inode\u0027s resource (bsc#1148133).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: fix update bit maps on CFG_MOR write (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: sunxi-ng: v3s: add missing clock slices for MMC2 module clocks (bsc#1051510).\n- clk: sunxi-ng: v3s: add the missing PLL_DDR1 (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: caam - fix concurrency issue in givencrypt descriptor (bsc#1051510).\n- crypto: caam - free resources in case caam_rng registration failed (bsc#1051510).\n- crypto: cavium/zip - Add missing single_release() (bsc#1051510).\n- crypto: ccp - Reduce maximum stack usage (bsc#1051510).\n- crypto: qat - Silence smp_processor_id() warning (bsc#1051510).\n- crypto: skcipher - Unmap pages after an external error (bsc#1051510).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- /dev/mem: Bail out upon SIGKILL (git-fixes).\n- dmaengine: dw: platform: Switch to acpi_dma_controller_register() (bsc#1051510).\n- dmaengine: iop-adma.c: fix printk format warning (bsc#1051510).\n- drivers: thermal: int340x_thermal: Fix sysfs race condition (bsc#1051510).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm/i915: Fix various tracepoints for gen2 (bsc#1113722)\n- drm/imx: Drop unused imx-ipuv3-crtc.o build (bsc#1113722)\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- Drop multiversion(kernel) from the KMP template (bsc#1127155).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1114279).\n- eeprom: at24: make spd world-readable again (git-fixes).\n- ext4: fix warning inside ext4_convert_unwritten_extents_endio (bsc#1152025).\n- ext4: set error return correctly when ext4_htree_store_dirent fails (bsc#1152024).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix kabi for: NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- Fix KVM kABI after x86 mmu backports (bsc#1117665).\n- gpio: fix line flag validation in lineevent_create (bsc#1051510).\n- gpio: fix line flag validation in linehandle_create (bsc#1051510).\n- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and blacklist (bsc#1051510).\n- gpiolib: only check line handle flags once (bsc#1051510).\n- gpio: Move gpiochip_lock/unlock_as_irq to gpio/driver.h (bsc#1051510).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwmon: (lm75) Fix write operations for negative temperatures (bsc#1051510).\n- hwmon: (shtc1) fix shtc1 and shtw1 id mask (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ife: error out when nla attributes are empty (networking-stable-19_08_08).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: dac: ad5380: fix incorrect assignment to val (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: elan_i2c - remove Lenovo Legion Y7000 PnpID (bsc#1051510).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- iommu/dma: Fix for dereferencing before null checking (bsc#1151667).\n- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151671).\n- ip6_tunnel: fix possible use-after-free on xmit (networking-stable-19_08_08).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6/addrconf: allow adding multicast addr if IFA_F_MCAUTOJOIN is set (networking-stable-19_08_28).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- isdn/capi: check message length in capi_write() (bsc#1051510).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI: media: em28xx: fix handler for vidioc_s_input() (bsc#1051510). fixes kABI\n- kABI: media: em28xx: stop rewriting device\u0027s struct (bsc#1051510). fixes kABI\n- kABI: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kABI/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- KVM: Convert kvm_lock to a mutex (bsc#1117665).\n- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- KVM: PPC: Book3S: Fix incorrect guest-to-user-translation error handling (bsc#1061840).\n- KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not lose pending doorbell request on migration on P9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not push XIVE context when not using XIVE device (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code (bsc#1061840).\n- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP (bsc#1061840).\n- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- KVM: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- KVM: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- leds: leds-lp5562 allow firmware files up to the maximum length (bsc#1051510).\n- leds: trigger: gpio: GPIO 0 is valid (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- libertas_tf: Use correct channel range in lbtf_geo_init (bsc#1051510).\n- libiscsi: do not try to bypass SCSI EH (bsc#1142076).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- livepatch: Nullify obj-\u003emod in klp_module_coming()\u0027s error path (bsc#1071995).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: minstrel_ht: fix per-group max throughput rate initialization (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md: do not report active array_state until after revalidate_disk() completes (git-fixes).\n- md: only call set_in_sync() when it is expected to succeed (git-fixes).\n- md/raid6: Set R5_ReadError when there is read failure on parity disk (git-fixes).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: atmel: atmel-isi: fix timeout value for stop streaming (bsc#1051510).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dib0700: fix link error for dibx000_i2c_set_speed (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: em28xx: fix handler for vidioc_s_input() (bsc#1051510).\n- media: em28xx: stop rewriting device\u0027s struct (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: fdp1: Reduce FCP not found message level to debug (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: marvell-ccic: do not generate EOF on parallel bus (bsc#1051510).\n- media: mc-device.c: do not memset __user pointer contents (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov6650: Fix sensor possibly not detected on probe (bsc#1051510).\n- media: ov6650: Move v4l2_clk_get() to ov6650_video_probe() helper (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: replace strcpy() by strscpy() (bsc#1051510).\n- media: Revert \u0027[media] marvell-ccic: reset ccic phy when stop streaming for stability\u0027 (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: technisat-usb2: break out of loop at end of buffer (bsc#1051510).\n- media: tm6000: double free if usb disconnect while streaming (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- media: vb2: Fix videobuf2 to map correct area (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mic: avoid statically declaring a \u0027struct device\u0027 (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdhci-msm: fix mutex while in spinlock (bsc#1142635).\n- mmc: sdhci-of-arasan: Do now show error message in case of deffered probe (bsc#1119086).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI RCU Schedule Stall (bsc#1051510).\n- mvpp2: refactor MTU change code (networking-stable-19_08_08).\n- net: bridge: delete local fdb on device init failure (networking-stable-19_08_08).\n- net: bridge: mcast: do not delete permanent entries when fast leave is enabled (networking-stable-19_08_08).\n- net: fix ifindex collision during namespace removal (networking-stable-19_08_08).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).\n- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5e: Only support tx/rx pause setting for port owner (networking-stable-19_08_21).\n- net/mlx5e: Prevent encap flow counter update async to user query (networking-stable-19_08_08).\n- net/mlx5e: Use flow keys dissector to parse packets for ARFS (networking-stable-19_08_21).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/mlx5: Use reversed order when unregister devices (networking-stable-19_08_08).\n- net/packet: fix race in tpacket_snd() (networking-stable-19_08_21).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: sched: Fix a possible null-pointer dereference in dequeue_func() (networking-stable-19_08_08).\n- net/smc: make sure EPOLLOUT is raised (networking-stable-19_08_28).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFS4: Fix v4.0 client state corruption when mount (git-fixes).\n- nfsd: degraded slot-count more gracefully as allocation nears exhaustion (bsc#1150381).\n- nfsd: Do not release the callback slot unless it was actually held (git-fixes).\n- nfsd: Fix overflow causing non-working mounts on 1 TB machines (bsc#1150381).\n- nfsd: fix performance-limiting session calculation (bsc#1150381).\n- nfsd: give out fewer session slots as limit approaches (bsc#1150381).\n- nfsd: handle drc over-allocation gracefully (bsc#1150381).\n- nfsd: increase DRC cache limit (bsc#1150381).\n- NFS: Do not interrupt file writeout due to fatal errors (git-fixes).\n- NFS: Do not open code clearing of delegation state (git-fixes).\n- NFS: Ensure O_DIRECT reports an error if the bytes read/written is 0 (git-fixes).\n- NFS: Fix regression whereby fscache errors are appearing on \u0027nofsc\u0027 mounts (git-fixes).\n- NFS: Forbid setting AF_INET6 to \u0027struct sockaddr_in\u0027-\u003esin_family (git-fixes).\n- NFS: Refactor nfs_lookup_revalidate() (git-fixes).\n- NFS: Remove redundant semicolon (git-fixes).\n- NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter (git-fixes).\n- NFSv4.1: Fix open stateid recovery (git-fixes).\n- NFSv4.1: Only reap expired delegations (git-fixes).\n- NFSv4: Check the return value of update_open_stateid() (git-fixes).\n- NFSv4: Fix an Oops in nfs4_do_setattr (git-fixes).\n- NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim() (git-fixes).\n- NFSv4: Fix delegation state recovery (git-fixes).\n- NFSv4: Fix lookup revalidate of regular files (git-fixes).\n- NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- NFSv4: Handle the special Linux file open access mode (git-fixes).\n- NFSv4: Only pass the delegation to setattr if we\u0027re sending a truncate (git-fixes).\n- NFSv4/pnfs: Fix a page lock leak in nfs_pageio_resend() (git-fixes).\n- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n- null_blk: complete requests from -\u003etimeout (bsc#1149446).\n- null_blk: wire up timeouts (bsc#1149446).\n- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).\n- nvmem: Use the same permissions for eeprom as for nvmem (git-fixes).\n- nvme-rdma: Allow DELETING state change failure in (bsc#1104967,).\n- nvme-rdma: centralize admin/io queue teardown sequence (bsc#1142076).\n- nvme-rdma: centralize controller setup sequence (bsc#1142076).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: stop admin queue before freeing it (bsc#1140155).\n- nvme-rdma: support up to 4 segments of inline data (bsc#1142076).\n- nvme-rdma: unquiesce queues when deleting the controller (bsc#1142076).\n- nvme: remove ns sibling before clearing path (bsc#1140155).\n- nvme: return BLK_EH_DONE from -\u003etimeout (bsc#1142076).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Detect and fix Hyper-V PCI domain number collision (bsc#1150423).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: Disable clearing VBUS in over-current (bsc#1051510).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC227E to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- PM: sleep: Fix possible overflow in pm_system_cancel_wakeup() (bsc#1051510).\n- PNFS fallback to MDS if no deviceid found (git-fixes).\n- pNFS/flexfiles: Fix PTR_ERR() dereferences in ff_layout_track_ds_error (git-fixes).\n- pNFS/flexfiles: Turn off soft RPC calls (git-fixes).\n- powerpc/64: Make sys_switch_endian() traceable (bsc#1065729).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: Fix MADV_[FREE|DONTNEED] TLB flush miss problem with THP (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Fix memory hotplug section page table creation (bsc#1065729).\n- powerpc/64s/radix: Fix memory hot-unplug page table split (bsc#1065729).\n- powerpc/64s/radix: Implement _tlbie(l)_va_range flush functions (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve preempt handling in TLB code (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve TLB flushing for page table freeing (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Introduce local single page ceiling for TLB range flush (bsc#1055117 bsc#1152161 ltc#181664).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: Optimize flush_tlb_range (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/book3s64/mm: Do not do tlbie fixup for some hardware revisions (bsc#1152161 ltc#181664).\n- powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flag (bsc#1152161 ltc#181664).\n- powerpc: bpf: Fix generation of load/store DW instructions (bsc#1065729).\n- powerpc/bpf: use unsigned division instruction for 64-bit operations (bsc#1065729).\n- powerpc: Drop page_is_ram() and walk_system_ram_range() (bsc#1065729).\n- powerpc/irq: Do not WARN continuously in arch_local_irq_restore() (bsc#1065729).\n- powerpc/irq: drop arch_early_irq_init() (bsc#1065729).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm: Fixup tlbie vs mtpidr/mtlpidr ordering issue on POWER9 (bsc#1152161 ltc#181664).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm/radix: Drop unneeded NULL check (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: implement LPID based TLB flushes to be used by KVM (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm: Simplify page_is_ram by using memblock_is_memory (bsc#1065729).\n- powerpc/mm: Use memblock API for PPC32 page_is_ram (bsc#1065729).\n- powerpc/module64: Fix comment in R_PPC64_ENTRY handling (bsc#1065729).\n- powerpc/powernv: Fix compile without CONFIG_TRACEPOINTS (bsc#1065729).\n- powerpc/powernv/ioda2: Allocate TCE table levels on demand for default DMA window (bsc#1061840).\n- powerpc/powernv/ioda: Fix race in TCE level allocation (bsc#1061840).\n- powerpc/powernv: move OPAL call wrapper tracing and interrupt handling to C (bsc#1065729).\n- powerpc/powernv/npu: Remove obsolete comment about TCE_KILL_INVAL_ALL (bsc#1065729).\n- powerpc/pseries: Call H_BLOCK_REMOVE when supported (bsc#1109158).\n- powerpc/pseries: Export maximum memory value (bsc#1122363).\n- powerpc/pseries: Export raw per-CPU VPA data via debugfs ().\n- powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt() (bsc#1065729).\n- powerpc/pseries/memory-hotplug: Fix return value type of find_aa_index (bsc#1065729).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Read TLB Block Invalidate Characteristics (bsc#1109158).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/ptrace: Simplify vr_get/set() to avoid GCC warning (bsc#1148868).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerpc/xive: Fix bogus error code returned by OPAL (bsc#1065729).\n- powerpc/xive: Implement get_irqchip_state method for XIVE to fix shutdown race (bsc#1065729).\n- powerpc/xmon: Fix opcode being uninitialized in print_insn_powerpc (bsc#1065729).\n- power: reset: gpio-restart: Fix typo when gpio reset is not found (bsc#1051510).\n- power: supply: Init device wakeup after device_add() (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- ppp: Fix memory leak in ppp_write (git-fixes).\n- printk: Do not lose last line in kmsg buffer dump (bsc#1152460).\n- printk: fix printk_time race (bsc#1152466).\n- printk/panic: Avoid deadlock in printk() after stopping CPUs by NMI (bsc#1148712).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qla2xxx: kABI fixes for v10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- qla2xxx: remove SGI SN2 support (bsc#1123034 bsc#1131304 bsc#1127988).\n- quota: fix wrong condition in is_quota_modification() (bsc#1152026).\n- r8152: Set memory to all 0xFFs on failed reg reads (bsc#1051510).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- regulator: lm363x: Fix off-by-one n_voltages for lm3632 ldo_vpos/ldo_vneg (bsc#1051510).\n- Revert \u0027mwifiex: fix system hang problem after resume\u0027 (bsc#1051510).\n- Revert \u0027Revert \u0027rpm/kernel-binary.spec.in: rename kGraft to KLP ()\u0027\u0027 This reverts commit 468af43c8fd8509820798b6d8ed363fc417ca939 Should get this rename again with next SLE15 merge.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add pci function reset support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Allow NVMe IO to resume with short cable pull (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: allow session delete to finish before create (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid PCI IRQ affinity mapping when multiqueue is not supported (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: avoid printf format warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that Coverity complains about dereferencing a NULL rport pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that lockdep complains about unsafe locking in tcm_qla2xxx_close_session() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that qla2x00_mem_free() crashes if called twice (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change abort wait_loop from msleep to wait_event_timeout (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change default ZIO threshold (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check the size of firmware data structures at compile time (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup fcport memory to prevent leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a command is released that is owned by the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if sp-\u003edone() is not called from the completion path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain loudly about reference count underflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correct error handling during initialization failures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: deadlock by configfs_depend_item (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare local symbols static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla24xx_build_scsi_crc_2_iocbs() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla2x00_find_new_loop_id() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do not corrupt vha-\u003eplogi_ack_list (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Downgrade driver to 10.01.00.19-k There are upstream bug reports against 10.01.00.19-k which haven\u0027t been resolved. Also the newer version failed to get a proper review. For time being it\u0027s better to got with the older version and do not introduce new bugs.\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix abort timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a qla24xx_enable_msix() error path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a recently introduced kernel warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a small typo in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment alignment in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix different size DMA Alloc/Unmap (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix DMA unmap leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix driver unload when FC-NVMe LUNs are connected (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix fcport null pointer access (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix formatting of pointer types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw dump corruption (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw options handle eh_bus_reset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix gnl.l memory leak on adapter init failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hang in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardirq-unsafe locking (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardlockup in abort command during driver remove (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix kernel crash after disconnecting NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix Nport ID display value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NULL pointer crash due to stale CPUID (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVME cmd and LS cmd timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVMe port discovery after a short device port loss (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix possible fcport null-pointer dereferences (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix premature timer expiration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix race conditions in the code for aborting SCSI commands (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix Relogin to prevent modifying scan_state flag (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session cleanup hang (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix spelling mistake \u0027alredy\u0027 -\u003e \u0027already\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix spelling mistake \u0027initializatin\u0027 -\u003e \u0027initialization\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB allocation flag to avoid sleeping in IRQ context (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stuck login session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix use-after-free issues in qla2xxx_qpair_sp_free_dma() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: flush IO on chip reset or sess delete (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Further limit FLASH region write access from SysFS (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Include the \u003casm/unaligned.h\u003e header file from qla_dsd.h (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Increase the max_sgl_segments to 1024 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Increase the size of the mailbox arrays from 4 to 8 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Insert spaces where required (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Leave a blank line after declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Log the status code if a firmware command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla24xx_async_abort_cmd() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_mem_free() easier to verify (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_process_response_queue() easier to read (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: move IO flush to the front of NVME rport unregistration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_clear_loop_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_is_reserved_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_fcport_state() from a .h into a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_reserved_loop_ids() definition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the \u003clinux/io-64-nonatomic-lo-hi.h\u003e include directive (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the port_state_str definition from a .h to a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: on session delete, return nvme cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Pass little-endian values to the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent memory leak for CT req/rsp allocation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: qla2x00_alloc_fw_dump: set ha-\u003eeft (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the number of forward declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reject EH_{abort|device_reset|target_request} (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a comment that refers to the SCSI host lock (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove dead code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove double assignment in qla2x00_update_fcport (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove FW default template (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove qla_tgt_cmd.data_work and qla_tgt_cmd.data_work_free (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove qla_tgt_cmd.released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove set but not used variable \u0027ptr_dma\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove the fcport test from qla_nvme_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unnecessary locking from the target code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unnecessary null check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove useless set memory to zero use memset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Replace vmalloc + memset with vzalloc (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reset the FCF_ASYNC_{SENT|ACTIVE} flags (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Restore FAWWPN of Physical Port only for loop down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Retry fabric Scan on IOCB queue full (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the qpair in SRB to NULL when SRB is released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the SCSI command result before calling the command done (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence Successful ELS IOCB message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qlt_send_term_imm_notif() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Skip FW dump on LOOP initialization error (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: target: Fix offline port handling and host reset handling (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Uninline qla2x00_init_timer() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Unregister resources in the opposite order of the registration order (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.13-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.16-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use an on-stack completion in qla24xx_control_vp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use ARRAY_SIZE() in the definition of QLA_LAST_SPEED (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use common update-firmware-options routine for ISP27xx+ (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use complete switch scan for RSCN events (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use Correct index for Q-Pair array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use get/put_unaligned where appropriate (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use __le64 instead of uint32_t for sending DMA addresses to firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use mutex protection during qla2x00_sysfs_read_fw_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use tabs to indent code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: scsi_dh_rdac: zero cdb in send_mode_select() (bsc#1149313).\n- scsi: scsi_transport_fc: nvme: display FC-NVMe port roles (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: tcm_qla2xxx: Minimize #include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi_transport_fc: complete requests from -\u003etimeout (bsc#1142076).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: fix the transport error_count check (networking-stable-19_08_21).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- secure boot lockdown: Fix-up backport of /dev/mem access restriction The upstream-submitted patch set has evolved over time, align our patches (contents and description) to reflect the current status as far as /dev/mem access is concerned.\n- Sign non-x86 kernels when possible (boo#1134303)\n- sky2: Disable MSI on yet another ASUS boards (P6Xxxx) (bsc#1051510).\n- slip: make slhc_free() silently accept an error pointer (bsc#1051510).\n- slip: sl_alloc(): remove unused parameter \u0027dev_t line\u0027 (bsc#1051510).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- SUNRPC fix regression in umount of a secure mount (git-fixes).\n- SUNRPC: Handle connection breakages correctly in call_status() (git-fixes).\n- SUNRPC/nfs: Fix return value for nfs4_callback_compound() (git-fixes).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: make sure EPOLLOUT wont be missed (networking-stable-19_08_28).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- team: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts (bsc#1082555).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: usbcore: Fix slab-out-of-bounds bug during device reset (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- video: ssd1307fb: Start page range at page_offset (bsc#1113722)\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16h (bsc#1114279).\n- x86/fpu: Add FPU state copying quirk to handle XRSTOR failure on Intel Skylake CPUs (bsc#1151955).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- x86/tls: Fix possible spectre-v1 in do_get_thread_area() (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/netback: Reset nr_frags before freeing skb (networking-stable-19_08_21).\n- xen-netfront: do not assume sk_buff_head list is empty in error handling (bsc#1065600).\n- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2879,SUSE-SLE-DESKTOP-12-SP4-2019-2879,SUSE-SLE-HA-12-SP4-2019-2879,SUSE-SLE-Live-Patching-12-SP4-2019-2879,SUSE-SLE-SDK-12-SP4-2019-2879,SUSE-SLE-SERVER-12-SP4-2019-2879,SUSE-SLE-WE-12-SP4-2019-2879", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2879-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2879-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192879-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2879-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054914", "url": "https://bugzilla.suse.com/1054914" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098291", "url": "https://bugzilla.suse.com/1098291" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1104967", "url": "https://bugzilla.suse.com/1104967" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1122363", "url": "https://bugzilla.suse.com/1122363" }, { "category": "self", "summary": "SUSE Bug 1123034", "url": "https://bugzilla.suse.com/1123034" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1127988", "url": "https://bugzilla.suse.com/1127988" }, { "category": "self", "summary": "SUSE Bug 1131304", "url": "https://bugzilla.suse.com/1131304" }, { "category": "self", "summary": "SUSE Bug 1133140", "url": "https://bugzilla.suse.com/1133140" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135854", "url": "https://bugzilla.suse.com/1135854" }, { "category": "self", "summary": "SUSE Bug 1135873", "url": "https://bugzilla.suse.com/1135873" }, { "category": "self", "summary": "SUSE Bug 1137799", "url": "https://bugzilla.suse.com/1137799" }, { "category": "self", "summary": "SUSE Bug 1137861", "url": "https://bugzilla.suse.com/1137861" }, { "category": "self", "summary": "SUSE Bug 1137865", "url": "https://bugzilla.suse.com/1137865" }, { "category": "self", "summary": "SUSE Bug 1137959", "url": "https://bugzilla.suse.com/1137959" }, { "category": "self", "summary": "SUSE Bug 1140155", "url": "https://bugzilla.suse.com/1140155" }, { "category": "self", "summary": "SUSE Bug 1140729", "url": "https://bugzilla.suse.com/1140729" }, { "category": "self", "summary": "SUSE Bug 1140845", "url": "https://bugzilla.suse.com/1140845" }, { "category": "self", "summary": "SUSE Bug 1140883", "url": "https://bugzilla.suse.com/1140883" }, { "category": "self", "summary": "SUSE Bug 1141600", "url": "https://bugzilla.suse.com/1141600" }, { "category": "self", "summary": "SUSE Bug 1142076", "url": "https://bugzilla.suse.com/1142076" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142667", "url": "https://bugzilla.suse.com/1142667" }, { "category": "self", "summary": "SUSE Bug 1144375", "url": "https://bugzilla.suse.com/1144375" }, { "category": "self", "summary": "SUSE Bug 1144449", "url": "https://bugzilla.suse.com/1144449" }, { "category": "self", "summary": "SUSE Bug 1145099", "url": "https://bugzilla.suse.com/1145099" }, { "category": "self", "summary": "SUSE Bug 1146042", "url": "https://bugzilla.suse.com/1146042" }, { "category": "self", "summary": "SUSE Bug 1146519", "url": "https://bugzilla.suse.com/1146519" }, { "category": "self", "summary": "SUSE Bug 1146540", "url": "https://bugzilla.suse.com/1146540" }, { "category": "self", "summary": "SUSE Bug 1146664", "url": "https://bugzilla.suse.com/1146664" }, { "category": "self", "summary": "SUSE Bug 1148133", "url": "https://bugzilla.suse.com/1148133" }, { "category": "self", "summary": "SUSE Bug 1148410", "url": "https://bugzilla.suse.com/1148410" }, { "category": "self", "summary": "SUSE Bug 1148712", "url": "https://bugzilla.suse.com/1148712" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1149313", "url": "https://bugzilla.suse.com/1149313" }, { "category": "self", "summary": "SUSE Bug 1149446", "url": "https://bugzilla.suse.com/1149446" }, { "category": "self", "summary": "SUSE Bug 1149555", "url": "https://bugzilla.suse.com/1149555" }, { "category": "self", "summary": "SUSE Bug 1149651", "url": "https://bugzilla.suse.com/1149651" }, { "category": "self", "summary": "SUSE Bug 1150381", "url": "https://bugzilla.suse.com/1150381" }, { "category": "self", "summary": "SUSE Bug 1150423", "url": "https://bugzilla.suse.com/1150423" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150875", "url": "https://bugzilla.suse.com/1150875" }, { "category": "self", "summary": "SUSE Bug 1151350", "url": "https://bugzilla.suse.com/1151350" }, { "category": "self", "summary": "SUSE Bug 1151508", "url": "https://bugzilla.suse.com/1151508" }, { "category": "self", "summary": "SUSE Bug 1151610", "url": "https://bugzilla.suse.com/1151610" }, { "category": "self", "summary": "SUSE Bug 1151667", "url": "https://bugzilla.suse.com/1151667" }, { "category": "self", "summary": "SUSE Bug 1151671", "url": "https://bugzilla.suse.com/1151671" }, { "category": "self", "summary": "SUSE Bug 1151680", "url": "https://bugzilla.suse.com/1151680" }, { "category": "self", "summary": "SUSE Bug 1151891", "url": "https://bugzilla.suse.com/1151891" }, { "category": "self", "summary": "SUSE Bug 1151955", "url": "https://bugzilla.suse.com/1151955" }, { "category": "self", "summary": "SUSE Bug 1152024", "url": "https://bugzilla.suse.com/1152024" }, { "category": "self", "summary": "SUSE Bug 1152025", "url": "https://bugzilla.suse.com/1152025" }, { "category": "self", "summary": "SUSE Bug 1152026", "url": "https://bugzilla.suse.com/1152026" }, { "category": "self", "summary": "SUSE Bug 1152161", "url": "https://bugzilla.suse.com/1152161" }, { "category": "self", "summary": "SUSE Bug 1152325", "url": "https://bugzilla.suse.com/1152325" }, { "category": "self", "summary": "SUSE Bug 1152457", "url": "https://bugzilla.suse.com/1152457" }, { "category": "self", "summary": "SUSE Bug 1152460", "url": "https://bugzilla.suse.com/1152460" }, { "category": "self", "summary": "SUSE Bug 1152466", "url": "https://bugzilla.suse.com/1152466" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1152791", "url": "https://bugzilla.suse.com/1152791" }, { "category": "self", "summary": "SUSE Bug 1152972", "url": "https://bugzilla.suse.com/1152972" }, { "category": "self", "summary": "SUSE Bug 1152974", "url": "https://bugzilla.suse.com/1152974" }, { "category": "self", "summary": "SUSE Bug 1152975", "url": "https://bugzilla.suse.com/1152975" }, { "category": "self", "summary": "SUSE Bug 1153112", "url": "https://bugzilla.suse.com/1153112" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153236", "url": "https://bugzilla.suse.com/1153236" }, { "category": "self", "summary": "SUSE Bug 1153263", "url": "https://bugzilla.suse.com/1153263" }, { "category": "self", "summary": "SUSE Bug 1153646", "url": "https://bugzilla.suse.com/1153646" }, { "category": "self", "summary": "SUSE Bug 1153713", "url": "https://bugzilla.suse.com/1153713" }, { "category": "self", "summary": "SUSE Bug 1153717", "url": "https://bugzilla.suse.com/1153717" }, { "category": "self", "summary": "SUSE Bug 1153718", "url": "https://bugzilla.suse.com/1153718" }, { "category": "self", "summary": "SUSE Bug 1153719", "url": "https://bugzilla.suse.com/1153719" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1154108", "url": "https://bugzilla.suse.com/1154108" }, { "category": "self", "summary": "SUSE Bug 1154189", "url": "https://bugzilla.suse.com/1154189" }, { "category": "self", "summary": "SUSE Bug 1154354", "url": "https://bugzilla.suse.com/1154354" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1154578", "url": "https://bugzilla.suse.com/1154578" }, { "category": "self", "summary": "SUSE Bug 1154607", "url": "https://bugzilla.suse.com/1154607" }, { "category": "self", "summary": "SUSE Bug 1154608", "url": "https://bugzilla.suse.com/1154608" }, { "category": "self", "summary": "SUSE Bug 1154610", "url": "https://bugzilla.suse.com/1154610" }, { "category": "self", "summary": "SUSE Bug 1154611", "url": "https://bugzilla.suse.com/1154611" }, { "category": "self", "summary": "SUSE Bug 1154651", "url": "https://bugzilla.suse.com/1154651" }, { "category": "self", "summary": "SUSE Bug 1154747", "url": "https://bugzilla.suse.com/1154747" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18595 page", "url": "https://www.suse.com/security/cve/CVE-2017-18595/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14821 page", "url": "https://www.suse.com/security/cve/CVE-2019-14821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15291 page", "url": "https://www.suse.com/security/cve/CVE-2019-15291/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9506 page", "url": "https://www.suse.com/security/cve/CVE-2019-9506/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-10-31T15:06:57Z", "generator": { "date": "2019-10-31T15:06:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2879-1", "initial_release_date": "2019-10-31T15:06:57Z", "revision_history": [ { "date": "2019-10-31T15:06:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.37.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.37.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.37.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.37.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.37.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.37.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.37.1.aarch64", "product_id": "kernel-default-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.37.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.37.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.37.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.37.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.37.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.37.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.37.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.37.1.aarch64", "product_id": "kernel-syms-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.37.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.37.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.37.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.37.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.37.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.37.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.37.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.37.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.37.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.37.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.37.1.noarch", "product_id": "kernel-devel-4.12.14-95.37.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.37.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.37.1.noarch", "product_id": "kernel-docs-4.12.14-95.37.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.37.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.37.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.37.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.37.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.37.1.noarch", "product_id": "kernel-macros-4.12.14-95.37.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.37.1.noarch", "product": { "name": "kernel-source-4.12.14-95.37.1.noarch", "product_id": "kernel-source-4.12.14-95.37.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.37.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.37.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.37.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.37.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.37.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.37.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.37.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.37.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.37.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.37.1.ppc64le", "product_id": "kernel-default-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.37.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.37.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.37.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.37.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.37.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.37.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.37.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.37.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.37.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.37.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.37.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.37.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.37.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.37.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.37.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.37.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.37.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.37.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.37.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.37.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.37.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.37.1.s390x", "product": { "name": "kernel-default-4.12.14-95.37.1.s390x", "product_id": "kernel-default-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.37.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.37.1.s390x", "product_id": "kernel-default-base-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.37.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.37.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.37.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.37.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.37.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.37.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.37.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.37.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.37.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.37.1.s390x", "product_id": "kernel-default-man-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.37.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.37.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.37.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.37.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.37.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.37.1.s390x", "product_id": "kernel-syms-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.37.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.37.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.37.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.37.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.37.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.37.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.37.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.37.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.37.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.37.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.37.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.37.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.37.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.37.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.37.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.37.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.37.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.37.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.37.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.37.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.37.1.x86_64", "product_id": "kernel-debug-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.37.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.37.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.37.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.37.1.x86_64", "product_id": "kernel-default-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.37.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.37.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.37.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.37.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.37.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.37.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.37.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.37.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.37.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.37.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.37.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.37.1.x86_64", "product_id": "kernel-syms-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.37.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.37.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.37.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.37.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.37.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.37.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.37.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-docs-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.37.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-95.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.37.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.37.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.37.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.37.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.37.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.37.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18595" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18595", "url": "https://www.suse.com/security/cve/CVE-2017-18595" }, { "category": "external", "summary": "SUSE Bug 1149555 for CVE-2017-18595", "url": "https://bugzilla.suse.com/1149555" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-31T15:06:57Z", "details": "moderate" } ], "title": "CVE-2017-18595" }, { "cve": "CVE-2019-14821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14821" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14821", "url": "https://www.suse.com/security/cve/CVE-2019-14821" }, { "category": "external", "summary": "SUSE Bug 1151350 for CVE-2019-14821", "url": "https://bugzilla.suse.com/1151350" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2019-14821", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-31T15:06:57Z", "details": "moderate" } ], "title": "CVE-2019-14821" }, { "cve": "CVE-2019-15291", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15291" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15291", "url": "https://www.suse.com/security/cve/CVE-2019-15291" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146540 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1146540" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-31T15:06:57Z", "details": "moderate" } ], "title": "CVE-2019-15291" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-31T15:06:57Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-31T15:06:57Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-31T15:06:57Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-31T15:06:57Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-31T15:06:57Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-9506", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9506" } ], "notes": [ { "category": "general", "text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9506", "url": "https://www.suse.com/security/cve/CVE-2019-9506" }, { "category": "external", "summary": "SUSE Bug 1137865 for CVE-2019-9506", "url": "https://bugzilla.suse.com/1137865" }, { "category": "external", "summary": "SUSE Bug 1146042 for CVE-2019-9506", "url": "https://bugzilla.suse.com/1146042" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_37-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.37.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.37.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-31T15:06:57Z", "details": "moderate" } ], "title": "CVE-2019-9506" } ] }
suse-su-2019:2952-1
Vulnerability from csaf_suse
Published
2019-11-12 18:13
Modified
2019-11-12 18:13
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15-SP1 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
Exception during Page Size Change, causing the CPU core to be non-functional.
The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
executable pages by splitting / merging huge pages into small pages as
More information can be found on https://www.suse.com/support/kb/doc/?id=7023735
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
Transactional Memory support could be used to facilitate sidechannel
information leaks out of microarchitectural buffers, similar to the
previously described 'Microarchitectural Data Sampling' attack.
The Linux kernel was supplemented with the option to disable TSX operation
altogether (requiring CPU Microcode updates on older systems) and better
flushing of microarchitectural buffers (VERW).
The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251
- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
failed to add a port, which may have caused denial of service (bsc#1152685).
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
alloc_workqueue return value, leading to a NULL pointer dereference.
(bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
space. (bsc#1144903).
- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
libertas driver (bsc#1150465).
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
leading to a Buffer Overflow (bsc#1153158).
- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
meant that unprivileged users could create a raw socket (bsc#1152788).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- Add kernel module compression support (bsc#1135854)
- acpi / CPPC: do not require the _PSD method (bsc#1051510).
- acpi / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- acpi: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).
- alsa: firewire-motu: add support for MOTU 4pre (bsc#1111666).
- alsa: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).
- alsa: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- alsa: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- alsa: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- alsa: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- alsa: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- alsa: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).
- alsa: hda - Inform too slow responses (bsc#1051510).
- alsa: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- alsa: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).
- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).
- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).
- alsa: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- alsa: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- alsa: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).
- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).
- alsa: hda/realtek - Fix alienware headset mic (bsc#1051510).
- alsa: hda/realtek - pci quirk for Medion E4254 (bsc#1051510).
- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- alsa: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- alsa: hda: Add Elkhart Lake pci ID (bsc#1051510).
- alsa: hda: Add Tigerlake/Jasperlake pci ID (bsc#1051510).
- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).
- alsa: hda: Flush interrupts on disabling (bsc#1051510).
- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).
- alsa: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).
- alsa: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).
- alsa: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- alsa: usb-audio: Clean up check_input_term() (bsc#1051510).
- alsa: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).
- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).
- alsa: usb-audio: Fix copy&paste error in the validator (bsc#1111666).
- alsa: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).
- alsa: usb-audio: More validations of descriptor units (bsc#1051510).
- alsa: usb-audio: Remove superfluous bLength checks (bsc#1051510).
- alsa: usb-audio: Simplify parse_audio_unit() (bsc#1051510).
- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- alsa: usb-audio: Unify audioformat release code (bsc#1051510).
- alsa: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).
- alsa: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).
- alsa: usb-audio: fix PCM device order (bsc#1051510).
- alsa: usb-audio: remove some dead code (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).
- arm64/cpufeature: Convert hook_lock to raw_spin_lock_t in cpu_enable_ssbs() (jsc#ECO-561).
- arm64: Add decoding macros for CP15_32 and CP15_64 traps (jsc#ECO-561).
- arm64: Add part number for Neoverse N1 (jsc#ECO-561).
- arm64: Add silicon-errata.txt entry for ARM erratum 1188873 (jsc#ECO-561).
- arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1 (jsc#ECO-561).
- arm64: Fake the IminLine size on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).
- arm64: Fix mismatched cache line size detection (jsc#ECO-561,jsc#SLE-10671).
- arm64: Fix silly typo in comment (jsc#ECO-561).
- arm64: Force SSBS on context switch (jsc#ECO-561).
- arm64: Introduce sysreg_clear_set() (jsc#ECO-561).
- arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT (jsc#ECO-561).
- arm64: Restrict ARM64_ERRATUM_1188873 mitigation to AArch32 (jsc#ECO-561).
- arm64: arch_timer: avoid unused function warning (jsc#ECO-561).
- arm64: compat: Add CNTFRQ trap handler (jsc#ECO-561).
- arm64: compat: Add CNTVCT trap handler (jsc#ECO-561).
- arm64: compat: Add condition code checks and IT advance (jsc#ECO-561).
- arm64: compat: Add cp15_32 and cp15_64 handler arrays (jsc#ECO-561).
- arm64: compat: Add separate CP15 trapping hook (jsc#ECO-561).
- arm64: compat: Workaround Neoverse-N1 #1542419 for compat user-space (jsc#ECO-561,jsc#SLE-10671).
- arm64: cpu: Move errata and feature enable callbacks closer to callers (jsc#ECO-561).
- arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZE (jsc#ECO-561,jsc#SLE-10671).
- arm64: cpufeature: Fix handling of CTR_EL0.IDC field (jsc#ECO-561,jsc#SLE-10671).
- arm64: cpufeature: Trap CTR_EL0 access only where it is necessary (jsc#ECO-561,jsc#SLE-10671).
- arm64: cpufeature: ctr: Fix cpu capability check for late CPUs (jsc#ECO-561,jsc#SLE-10671).
- arm64: entry: Allow handling of undefined instructions from EL1 (jsc#ECO-561).
- arm64: errata: Hide CTR_EL0.DIC on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).
- arm64: fix SSBS sanitization (jsc#ECO-561).
- arm64: force_signal_inject: WARN if called from kernel context (jsc#ECO-561).
- arm64: kill change_cpacr() (jsc#ECO-561).
- arm64: kill config_sctlr_el1() (jsc#ECO-561).
- arm64: kvm: Add invalidate_icache_range helper (jsc#ECO-561,jsc#SLE-10671).
- arm64: kvm: PTE/PMD S2 XN bit definition (jsc#ECO-561,jsc#SLE-10671).
- arm64: move SCTLR_EL{1,2} assertions to <asm/sysreg.h> (jsc#ECO-561).
- arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (jsc#ECO-561).
- arm: kvm: Add optimized PIPT icache flushing (jsc#ECO-561,jsc#SLE-10671).
- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).
- asoc: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- asoc: Intel: NHLT: Fix debug print format (bsc#1051510).
- asoc: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).
- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).
- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bnxt_en: Add pci IDs for 57500 series NPAR devices (bsc#1153607).
- boot: Sign non-x86 kernels when possible (boo#1134303)
- bpf: fix use after free in prog symbol exposure (bsc#1083647).
- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).
- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- config: arm64: enable erratum 1418040 and 1542419
- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).
- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).
- crypto: af_alg - consolidation of duplicate code (bsc#1154737).
- crypto: af_alg - fix race accessing cipher request (bsc#1154737).
- crypto: af_alg - remove locking in async callback (bsc#1154737).
- crypto: af_alg - update correct dst SGL entry (bsc#1051510).
- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).
- crypto: algif - return error code when no data was processed (bsc#1154737).
- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).
- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).
- crypto: algif_aead - overhaul memory management (bsc#1154737).
- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).
- crypto: algif_skcipher - overhaul memory management (bsc#1154737).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: do not dma memory off of the stack (bsc#1152790).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)
- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).
- drm/amd/display: reprogram VM config when system resume (bsc#1111666).
- drm/amd/display: support spdif (bsc#1111666).
- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).
- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).
- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).
- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/atomic_helper: Allow DPMS On<->Off changes for unregistered connectors (bsc#1111666).
- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).
- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).
- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)
- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)
- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)
- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)
- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)
- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)
- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)
- drm/i915: Allow parsing of unsized batches (bsc#1135967)
- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).
- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)
- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).
- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)
- drm/i915: Remove Master tables from cmdparser (bsc#1135967)
- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)
- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).
- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)
- drm/mediatek: set DMA max segment size (bsc#1111666).
- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).
- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)
- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).
- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).
- drm/panel: check failure cases in the probe func (bsc#1111666).
- drm/panel: make drm_panel.h self-contained (bsc#1111666).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).
- drm/stm: attach gem fence to atomic state (bsc#1111666).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm: add __user attribute to ptr_to_compat() (bsc#1111666).
- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).
- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).
- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).
- efi: cper: print AER info of pcie fatal error (bsc#1051510).
- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- hid: apple: Fix stuck function keys when using FN (bsc#1051510).
- hid: fix error message in hid_open_report() (bsc#1051510).
- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).
- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).
- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hso: fix NULL-deref on tty open (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: ca8210: prevent memory leak (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).
- integrity: prevent deadlock during digsig verification (bsc#1090631).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).
- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).
- irqchip/gic-v3-its: Fix LPI release for Multi-MSI devices (jsc#ECO-561).
- irqchip/gic-v3-its: Fix command queue pointer comparison bug (jsc#ECO-561).
- irqchip/gic-v3-its: Fix misuse of GENMASK macro (jsc#ECO-561).
- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).
- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kABI workaround for crypto/af_alg changes (bsc#1154737).
- kABI workaround for drm_connector.registered type changes (bsc#1111666).
- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: arm/arm64: Clean dcache to PoC when changing PTE due to CoW (jsc#ECO-561,jsc#SLE-10671).
- kvm: arm/arm64: Detangle kvm_mmu.h from kvm_hyp.h (jsc#ECO-561,jsc#SLE-10671).
- kvm: arm/arm64: Drop vcpu parameter from guest cache maintenance operartions (jsc#ECO-561,jsc#SLE-10671).
- kvm: arm/arm64: Limit icache invalidation to prefetch aborts (jsc#ECO-561,jsc#SLE-10671).
- kvm: arm/arm64: Only clean the dcache on translation fault (jsc#ECO-561,jsc#SLE-10671).
- kvm: arm/arm64: Preserve Exec permission across R/W permission faults (jsc#ECO-561,jsc#SLE-10671).
- kvm: arm/arm64: Split dcache/icache flushing (jsc#ECO-561,jsc#SLE-10671).
- kvm: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (jsc#ECO-561).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).
- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).
- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).
- lpfc: Add additional discovery log messages (bsc#1154521).
- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).
- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).
- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).
- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).
- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).
- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).
- lpfc: Make FW logging dynamically configurable (bsc#1154521).
- lpfc: Remove lock contention target write path (bsc#1154521).
- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).
- lpfc: Slight fast-path Performance optimizations (bsc#1154521).
- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).
- lpfc: fix coverity error of dereference after null check (bsc#1154521).
- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mac80211: Reject malformed SSID elements (bsc#1051510).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- mac80211: fix txq null pointer dereference (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).
- md/raid0: fix warning message for parameter default_layout (bsc#1140090).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).
- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).
- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).
- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).
- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).
- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).
- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).
- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).
- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- net_sched: add policy validation for action attributes (networking-stable-19_09_30).
- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- nfs: fix incorrectly backported patch (boo#1154189 bsc#1154747).
- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix null pointer dereference (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).
- packaging: add support for riscv64
- pci: Correct pci=resource_alignment parameter example (bsc#1051510).
- pci: PM: Fix pci_power_up() (bsc#1051510).
- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- pci: hv: Use bytes 4 and 5 from instance ID as the pci domain numbers (bsc#1153263).
- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).
- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- powerplay: Respect units on max dcfclk watermark (bsc#1111666).
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).
- r8152: Set macpassthru in reset_resume callback (bsc#1051510).
- rdma/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- rdma/hns: Add reset process for function-clear (bsc#1155061).
- rdma/hns: Remove the some magic number (bsc#1155061).
- rdma: Fix goto target to release the allocated memory (bsc#1050244).
- rds: Fix warning (bsc#1154848).
- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.
- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.
- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)
- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.
- rpm/kernel-binary.spec.in: support partial rt debug config.
- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).
- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.
- rpm/mkspec: Correct tarball URL for rc kernels.
- rpm/mkspec: Make building DTBs optional.
- rpm/modflist: Simplify compression support.
- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.
- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with '.ko' which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize '.ko.xz' in addition to '.ko'.
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).
- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).
- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).
- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).
- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).
- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).
- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).
- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).
- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).
- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).
- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scripts/arch-symbols: add missing link.
- scsi: lpfc: Check queue pointer before use (bsc#1154242).
- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).
- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).
- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).
- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).
- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).
- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).
- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).
- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).
- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).
- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).
- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).
- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).
- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).
- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).
- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).
- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).
- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).
- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: lpfc: Update async event logging (bsc#1154521).
- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).
- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).
- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- skge: fix checksum byte order (networking-stable-19_09_30).
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).
- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).
- usb: ldusb: fix memleak on disconnect (bsc#1051510).
- usb: ldusb: fix read info leaks (bsc#1051510).
- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix memleak on disconnect (bsc#1051510).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).
- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usblp: fix use-after-free on disconnect (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).
- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames
SUSE-2019-2952,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2952
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15-SP1 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- Add kernel module compression support (bsc#1135854)\n- acpi / CPPC: do not require the _PSD method (bsc#1051510).\n- acpi / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- acpi: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- alsa: firewire-motu: add support for MOTU 4pre (bsc#1111666).\n- alsa: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- alsa: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- alsa: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- alsa: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- alsa: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- alsa: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- alsa: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- alsa: hda - Inform too slow responses (bsc#1051510).\n- alsa: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- alsa: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).\n- alsa: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- alsa: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- alsa: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- alsa: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- alsa: hda/realtek - pci quirk for Medion E4254 (bsc#1051510).\n- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- alsa: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- alsa: hda: Add Elkhart Lake pci ID (bsc#1051510).\n- alsa: hda: Add Tigerlake/Jasperlake pci ID (bsc#1051510).\n- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).\n- alsa: hda: Flush interrupts on disabling (bsc#1051510).\n- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- alsa: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- alsa: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).\n- alsa: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- alsa: usb-audio: Clean up check_input_term() (bsc#1051510).\n- alsa: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).\n- alsa: usb-audio: Fix copy\u0026paste error in the validator (bsc#1111666).\n- alsa: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- alsa: usb-audio: More validations of descriptor units (bsc#1051510).\n- alsa: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- alsa: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- alsa: usb-audio: Unify audioformat release code (bsc#1051510).\n- alsa: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- alsa: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- alsa: usb-audio: fix PCM device order (bsc#1051510).\n- alsa: usb-audio: remove some dead code (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- arm64/cpufeature: Convert hook_lock to raw_spin_lock_t in cpu_enable_ssbs() (jsc#ECO-561).\n- arm64: Add decoding macros for CP15_32 and CP15_64 traps (jsc#ECO-561).\n- arm64: Add part number for Neoverse N1 (jsc#ECO-561).\n- arm64: Add silicon-errata.txt entry for ARM erratum 1188873 (jsc#ECO-561).\n- arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1 (jsc#ECO-561).\n- arm64: Fake the IminLine size on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix mismatched cache line size detection (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix silly typo in comment (jsc#ECO-561).\n- arm64: Force SSBS on context switch (jsc#ECO-561).\n- arm64: Introduce sysreg_clear_set() (jsc#ECO-561).\n- arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT (jsc#ECO-561).\n- arm64: Restrict ARM64_ERRATUM_1188873 mitigation to AArch32 (jsc#ECO-561).\n- arm64: arch_timer: avoid unused function warning (jsc#ECO-561).\n- arm64: compat: Add CNTFRQ trap handler (jsc#ECO-561).\n- arm64: compat: Add CNTVCT trap handler (jsc#ECO-561).\n- arm64: compat: Add condition code checks and IT advance (jsc#ECO-561).\n- arm64: compat: Add cp15_32 and cp15_64 handler arrays (jsc#ECO-561).\n- arm64: compat: Add separate CP15 trapping hook (jsc#ECO-561).\n- arm64: compat: Workaround Neoverse-N1 #1542419 for compat user-space (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpu: Move errata and feature enable callbacks closer to callers (jsc#ECO-561).\n- arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZE (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Fix handling of CTR_EL0.IDC field (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Trap CTR_EL0 access only where it is necessary (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: ctr: Fix cpu capability check for late CPUs (jsc#ECO-561,jsc#SLE-10671).\n- arm64: entry: Allow handling of undefined instructions from EL1 (jsc#ECO-561).\n- arm64: errata: Hide CTR_EL0.DIC on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: fix SSBS sanitization (jsc#ECO-561).\n- arm64: force_signal_inject: WARN if called from kernel context (jsc#ECO-561).\n- arm64: kill change_cpacr() (jsc#ECO-561).\n- arm64: kill config_sctlr_el1() (jsc#ECO-561).\n- arm64: kvm: Add invalidate_icache_range helper (jsc#ECO-561,jsc#SLE-10671).\n- arm64: kvm: PTE/PMD S2 XN bit definition (jsc#ECO-561,jsc#SLE-10671).\n- arm64: move SCTLR_EL{1,2} assertions to \u0026lt;asm/sysreg.h\u003e (jsc#ECO-561).\n- arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (jsc#ECO-561).\n- arm: kvm: Add optimized PIPT icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).\n- asoc: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- asoc: Intel: NHLT: Fix debug print format (bsc#1051510).\n- asoc: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add pci IDs for 57500 series NPAR devices (bsc#1153607).\n- boot: Sign non-x86 kernels when possible (boo#1134303)\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).\n- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- config: arm64: enable erratum 1418040 and 1542419\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On\u0026lt;-\u003eOff changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of pcie fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- hid: apple: Fix stuck function keys when using FN (bsc#1051510).\n- hid: fix error message in hid_open_report() (bsc#1051510).\n- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- irqchip/gic-v3-its: Fix LPI release for Multi-MSI devices (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix command queue pointer comparison bug (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix misuse of GENMASK macro (jsc#ECO-561).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: arm/arm64: Clean dcache to PoC when changing PTE due to CoW (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Detangle kvm_mmu.h from kvm_hyp.h (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Drop vcpu parameter from guest cache maintenance operartions (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Limit icache invalidation to prefetch aborts (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Only clean the dcache on translation fault (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Preserve Exec permission across R/W permission faults (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Split dcache/icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (jsc#ECO-561).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).\n- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- nfs: fix incorrectly backported patch (boo#1154189 bsc#1154747).\n- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- pci: Correct pci=resource_alignment parameter example (bsc#1051510).\n- pci: PM: Fix pci_power_up() (bsc#1051510).\n- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- pci: hv: Use bytes 4 and 5 from instance ID as the pci domain numbers (bsc#1153263).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rdma/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- rdma/hns: Add reset process for function-clear (bsc#1155061).\n- rdma/hns: Remove the some magic number (bsc#1155061).\n- rdma: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).\n- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).\n- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).\n- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).\n- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).\n- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2952,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2952", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2952-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2952-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2952-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1082635", "url": "https://bugzilla.suse.com/1082635" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1090631", "url": "https://bugzilla.suse.com/1090631" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1096254", "url": "https://bugzilla.suse.com/1096254" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098291", "url": "https://bugzilla.suse.com/1098291" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113994", "url": "https://bugzilla.suse.com/1113994" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1119461", "url": "https://bugzilla.suse.com/1119461" }, { "category": "self", "summary": "SUSE Bug 1119465", "url": "https://bugzilla.suse.com/1119465" }, { "category": "self", "summary": "SUSE Bug 1123034", "url": "https://bugzilla.suse.com/1123034" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1133140", "url": "https://bugzilla.suse.com/1133140" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135854", "url": "https://bugzilla.suse.com/1135854" }, { "category": "self", "summary": "SUSE Bug 1135873", "url": "https://bugzilla.suse.com/1135873" }, { "category": "self", "summary": "SUSE Bug 1135967", "url": "https://bugzilla.suse.com/1135967" }, { "category": "self", "summary": "SUSE Bug 1137040", "url": "https://bugzilla.suse.com/1137040" }, { "category": "self", "summary": "SUSE Bug 1137799", "url": "https://bugzilla.suse.com/1137799" }, { "category": "self", "summary": "SUSE Bug 1137861", "url": "https://bugzilla.suse.com/1137861" }, { "category": "self", "summary": "SUSE Bug 1138190", "url": "https://bugzilla.suse.com/1138190" }, { "category": "self", "summary": "SUSE Bug 1140090", "url": "https://bugzilla.suse.com/1140090" }, { "category": "self", "summary": "SUSE Bug 1140729", "url": "https://bugzilla.suse.com/1140729" }, { "category": "self", "summary": "SUSE Bug 1140845", "url": "https://bugzilla.suse.com/1140845" }, { "category": "self", "summary": "SUSE Bug 1140883", "url": "https://bugzilla.suse.com/1140883" }, { "category": "self", "summary": "SUSE Bug 1141600", "url": "https://bugzilla.suse.com/1141600" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142667", "url": "https://bugzilla.suse.com/1142667" }, { "category": "self", "summary": "SUSE Bug 1143706", "url": "https://bugzilla.suse.com/1143706" }, { "category": "self", "summary": "SUSE Bug 1144338", "url": "https://bugzilla.suse.com/1144338" }, { "category": "self", "summary": "SUSE Bug 1144375", "url": "https://bugzilla.suse.com/1144375" }, { "category": "self", "summary": "SUSE Bug 1144449", "url": "https://bugzilla.suse.com/1144449" }, { "category": "self", "summary": "SUSE Bug 1144903", "url": "https://bugzilla.suse.com/1144903" }, { "category": "self", "summary": "SUSE Bug 1145099", "url": "https://bugzilla.suse.com/1145099" }, { "category": "self", "summary": "SUSE Bug 1146612", "url": "https://bugzilla.suse.com/1146612" }, { "category": "self", "summary": "SUSE Bug 1148410", "url": "https://bugzilla.suse.com/1148410" }, { "category": "self", "summary": "SUSE Bug 1149119", "url": "https://bugzilla.suse.com/1149119" }, { "category": "self", "summary": "SUSE Bug 1149853", "url": "https://bugzilla.suse.com/1149853" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150457", "url": "https://bugzilla.suse.com/1150457" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150875", "url": "https://bugzilla.suse.com/1150875" }, { "category": "self", "summary": "SUSE Bug 1151508", "url": "https://bugzilla.suse.com/1151508" }, { "category": "self", "summary": "SUSE Bug 1151807", "url": "https://bugzilla.suse.com/1151807" }, { "category": "self", "summary": "SUSE Bug 1152033", "url": "https://bugzilla.suse.com/1152033" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1152665", "url": "https://bugzilla.suse.com/1152665" }, { "category": "self", "summary": "SUSE Bug 1152685", "url": "https://bugzilla.suse.com/1152685" }, { "category": "self", "summary": "SUSE Bug 1152696", "url": "https://bugzilla.suse.com/1152696" }, { "category": "self", "summary": "SUSE Bug 1152697", "url": "https://bugzilla.suse.com/1152697" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1152790", "url": "https://bugzilla.suse.com/1152790" }, { "category": "self", "summary": "SUSE Bug 1152791", "url": "https://bugzilla.suse.com/1152791" }, { "category": "self", "summary": "SUSE Bug 1153112", "url": "https://bugzilla.suse.com/1153112" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153236", "url": "https://bugzilla.suse.com/1153236" }, { "category": "self", "summary": "SUSE Bug 1153263", "url": "https://bugzilla.suse.com/1153263" }, { "category": "self", "summary": "SUSE Bug 1153476", "url": "https://bugzilla.suse.com/1153476" }, { "category": "self", "summary": "SUSE Bug 1153509", "url": "https://bugzilla.suse.com/1153509" }, { "category": "self", "summary": "SUSE Bug 1153607", "url": "https://bugzilla.suse.com/1153607" }, { "category": "self", "summary": "SUSE Bug 1153646", "url": "https://bugzilla.suse.com/1153646" }, { "category": "self", "summary": "SUSE Bug 1153681", "url": "https://bugzilla.suse.com/1153681" }, { "category": "self", "summary": "SUSE Bug 1153713", "url": "https://bugzilla.suse.com/1153713" }, { "category": "self", "summary": "SUSE Bug 1153717", "url": "https://bugzilla.suse.com/1153717" }, { "category": "self", "summary": "SUSE Bug 1153718", "url": "https://bugzilla.suse.com/1153718" }, { "category": "self", "summary": "SUSE Bug 1153719", "url": "https://bugzilla.suse.com/1153719" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1153969", "url": "https://bugzilla.suse.com/1153969" }, { "category": "self", "summary": "SUSE Bug 1154108", "url": "https://bugzilla.suse.com/1154108" }, { "category": "self", "summary": "SUSE Bug 1154189", "url": "https://bugzilla.suse.com/1154189" }, { "category": "self", "summary": "SUSE Bug 1154242", "url": "https://bugzilla.suse.com/1154242" }, { "category": "self", "summary": "SUSE Bug 1154268", "url": "https://bugzilla.suse.com/1154268" }, { "category": "self", "summary": "SUSE Bug 1154354", "url": "https://bugzilla.suse.com/1154354" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1154521", "url": "https://bugzilla.suse.com/1154521" }, { "category": "self", "summary": "SUSE Bug 1154578", "url": "https://bugzilla.suse.com/1154578" }, { "category": "self", "summary": "SUSE Bug 1154607", "url": "https://bugzilla.suse.com/1154607" }, { "category": "self", "summary": "SUSE Bug 1154608", "url": "https://bugzilla.suse.com/1154608" }, { "category": "self", "summary": "SUSE Bug 1154610", "url": "https://bugzilla.suse.com/1154610" }, { "category": "self", "summary": "SUSE Bug 1154611", "url": "https://bugzilla.suse.com/1154611" }, { "category": "self", "summary": "SUSE Bug 1154651", "url": "https://bugzilla.suse.com/1154651" }, { "category": "self", "summary": "SUSE Bug 1154737", "url": "https://bugzilla.suse.com/1154737" }, { "category": "self", "summary": "SUSE Bug 1154747", "url": "https://bugzilla.suse.com/1154747" }, { "category": "self", "summary": "SUSE Bug 1154848", "url": "https://bugzilla.suse.com/1154848" }, { "category": "self", "summary": "SUSE Bug 1154858", "url": "https://bugzilla.suse.com/1154858" }, { "category": "self", "summary": "SUSE Bug 1154905", "url": "https://bugzilla.suse.com/1154905" }, { "category": "self", "summary": "SUSE Bug 1154956", "url": "https://bugzilla.suse.com/1154956" }, { "category": "self", "summary": "SUSE Bug 1155061", "url": "https://bugzilla.suse.com/1155061" }, { "category": "self", "summary": "SUSE Bug 1155178", "url": "https://bugzilla.suse.com/1155178" }, { "category": "self", "summary": "SUSE Bug 1155179", "url": "https://bugzilla.suse.com/1155179" }, { "category": "self", "summary": "SUSE Bug 1155184", "url": "https://bugzilla.suse.com/1155184" }, { "category": "self", "summary": "SUSE Bug 1155186", "url": "https://bugzilla.suse.com/1155186" }, { "category": "self", "summary": "SUSE Bug 1155671", "url": "https://bugzilla.suse.com/1155671" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12207 page", "url": "https://www.suse.com/security/cve/CVE-2018-12207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11135 page", "url": "https://www.suse.com/security/cve/CVE-2019-11135/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16233 page", "url": "https://www.suse.com/security/cve/CVE-2019-16233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16995 page", "url": "https://www.suse.com/security/cve/CVE-2019-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-11-12T18:13:14Z", "generator": { "date": "2019-11-12T18:13:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2952-1", "initial_release_date": "2019-11-12T18:13:14Z", "revision_history": [ { "date": "2019-11-12T18:13:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-8.19.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-8.19.1.noarch", "product_id": "kernel-devel-azure-4.12.14-8.19.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-8.19.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-8.19.1.noarch", "product_id": "kernel-source-azure-4.12.14-8.19.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-8.19.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-8.19.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-8.19.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-8.19.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-8.19.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-8.19.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-8.19.1.x86_64", "product": { "name": "kernel-azure-4.12.14-8.19.1.x86_64", "product_id": "kernel-azure-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-8.19.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-8.19.1.x86_64", "product_id": "kernel-azure-base-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-8.19.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-8.19.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-8.19.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-8.19.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-8.19.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-8.19.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-8.19.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-8.19.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-8.19.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-8.19.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-8.19.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-8.19.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-8.19.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-8.19.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-8.19.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-8.19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-8.19.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-8.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-8.19.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-8.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-8.19.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-8.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-8.19.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-8.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-8.19.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-8.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-8.19.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-8.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12207" } ], "notes": [ { "category": "general", "text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12207", "url": "https://www.suse.com/security/cve/CVE-2018-12207" }, { "category": "external", "summary": "SUSE Bug 1117665 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1117665" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1155812 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155812" }, { "category": "external", "summary": "SUSE Bug 1155817 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155817" }, { "category": "external", "summary": "SUSE Bug 1155945 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155945" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "moderate" } ], "title": "CVE-2018-12207" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "important" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-11135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11135" } ], "notes": [ { "category": "general", "text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11135", "url": "https://www.suse.com/security/cve/CVE-2019-11135" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152497 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152497" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1152506 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152506" }, { "category": "external", "summary": "SUSE Bug 1160120 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1160120" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "moderate" } ], "title": "CVE-2019-11135" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16233" } ], "notes": [ { "category": "general", "text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16233", "url": "https://www.suse.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "SUSE Bug 1150457 for CVE-2019-16233", "url": "https://bugzilla.suse.com/1150457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "low" } ], "title": "CVE-2019-16233" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16995" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16995", "url": "https://www.suse.com/security/cve/CVE-2019-16995" }, { "category": "external", "summary": "SUSE Bug 1152685 for CVE-2019-16995", "url": "https://bugzilla.suse.com/1152685" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "moderate" } ], "title": "CVE-2019-16995" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:13:14Z", "details": "moderate" } ], "title": "CVE-2019-17666" } ] }
suse-su-2019:2984-1
Vulnerability from csaf_suse
Published
2019-11-20 10:32
Modified
2019-11-20 10:32
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
Exception during Page Size Change, causing the CPU core to be non-functional.
The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
executable pages by splitting / merging huge pages into small pages as
needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735
- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
failed to add a port, which may have caused denial of service (bsc#1152685).
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
Transactional Memory support could be used to facilitate sidechannel
information leaks out of microarchitectural buffers, similar to the
previously described 'Microarchitectural Data Sampling' attack.
The Linux kernel was supplemented with the option to disable TSX operation
altogether (requiring CPU Microcode updates on older systems) and better
flushing of microarchitectural buffers (VERW).
The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
alloc_workqueue return value, leading to a NULL pointer dereference.
(bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
space. (bsc#1144903).
- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).
- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
leading to a Buffer Overflow (bsc#1153158).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
libertas driver (bsc#1150465).
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not
enforce CAP_NET_RAW, which meant that unprivileged users could create a raw
socket (bnc#1152782).
- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
meant that unprivileged users could create a raw socket (bsc#1152788).
- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,
which caused an i_size_read() infinite loop and denial of service on SMP
systems (bnc#1151347).
- CVE-2019-15902: A backporting issue was discovered that re-introduced the
Spectre vulnerability it had aimed to eliminate. This occurred because the
backport process depends on cherry picking specific commits, and because two
(correctly ordered) code lines were swapped (bnc#1149376).
- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused
by a malicious USB device (bnc#1146519).
- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused
to cause denial of service (bnc#1148938).
- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a
process that wants to create a ptrace relationship, which allowed local users
to obtain root access by leveraging certain scenarios with a parent-child
process relationship, where a parent drops privileges and calls execve
(potentially allowing control by an attacker). (bnc#1140671).
- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel's kvm
hypervisor. An unprivileged host user or process with access to '/dev/kvm'
device could use this flaw to crash the host kernel, resulting in a denial of
service or potentially escalating privileges on the system (bnc#1151350).
- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by
crafted USB device traffic (bnc#1147122).
- CVE-2017-18595: A double free in allocate_trace_buffer was fixed
(bnc#1149555).
- CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
functionality that translates virtqueue buffers to IOVs. A privileged guest
user able to pass descriptors with invalid length to the host could use this
flaw to increase their privileges on the host (bnc#1150112).
- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious
USB device (bnc#1146361).
- CVE-2019-15924: A a NULL pointer dereference has been fixed in the
drivers/net/ethernet/intel/fm10k module (bnc#1149612).
- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been
fixed. This issue could lead to local escalation of privilege with System
execution privileges needed. (bnc#1150025).
- CVE-2019-15926: An out-of-bounds access was fixed in the
drivers/net/wireless/ath/ath6kl module. (bnc#1149527).
- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer
module (bnc#1149522).
- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm
module that could cause denial of service (bnc#1148394).
- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by
a malicious USB device (bnc#1146519 1146524).
- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a
malicious USB device (bnc#1146519 1146526).
- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by
a malicious USB device (bnc#1146519 1146529).
- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi
chip driver. That issue allowed local users to cause a denial of service
(system crash) or possibly execute arbitrary code (bnc#1146512).
- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed
(bsc#1146512, bsc#1146514, bsc#1146516).
- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver
was fixed. Local users would have abused this issue to cause a denial of
service (system crash) or possibly execute arbitrary code (bnc#1146516).
- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket
option, an attacker could control a pointer in kernel land and cause an
inet_csk_listen_stop general protection fault, or potentially execute
arbitrary code under certain circumstances. The issue can be triggered as
root (e.g., inside a default LXC container or with the CAP_NET_ADMIN
capability) or after namespace unsharing. (bnc#1145477)
- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently
low encryption key length and did not prevent an attacker from influencing
the key length negotiation. This allowed practical brute-force attacks (aka
'KNOB') that could decrypt traffic and inject arbitrary ciphertext without
the victim noticing (bnc#1137865).
- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was
fixed (bnc#1146378).
- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe
was fixed (bsc#1146378).
- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver
(bnc#1146391).
- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc
(bnc#1146584).
- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was
fixed in the drivers/media/v4l2-core driver (bnc#1146519).
- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB
device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).
- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed
(bnc#1146519).
- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device
was fixed in the drivers/media/usb/siano driver (bnc#1146413).
- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was
fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).
- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver
(bnc#1146285).
- CVE-2019-0154: An unprotected read access to i915 registers has been fixed
that could have been abused to facilitate a local denial-of-service attack.
(bsc#1135966)
- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the
i915 module that allowed batch buffers from user mode to gain super user
privileges. (bsc#1135967)
- CVE-2019-16231: The fjes driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bnc#1150466)
- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have lead to a denial of service or possibly unspecified other impact (bsc#1156187)
- CVE-2019-18680: A NULL pointer dereference in rds_tcp_kill_sock() could cause denial of service (bnc#1155898)
The following non-security bugs were fixed:
- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).
- documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ib/core: array_index_nospec: Sanitize speculative array (bsc#1155671)
- ipv6: Update ipv6 defrag code (add bsc#1141054).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm kABI Fix for NX patches (bsc#1117665).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: MMU: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).
- kvm: MMU: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).
- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).
- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).
- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).
- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).
- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).
- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- kvm: x86: simplify ept_misconfig (bsc#1117665).
- media: smsusb: better handle optional alignment (bsc#1146413).
- mm: use upstream patch for bsc#1106913
- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878)
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1068032, bsc#1092497).
- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bsc#1150223).
- x86/mitigations: Backport the STIBP pile See bsc#1139550
- xen-blkfront: avoid ENOMEM in blkif_recover after migration (bsc#1149849).
Patchnames
SUSE-2019-2984,SUSE-OpenStack-Cloud-7-2019-2984,SUSE-SLE-HA-12-SP2-2019-2984,SUSE-SLE-SAP-12-SP2-2019-2984,SUSE-SLE-SERVER-12-SP2-2019-2984,SUSE-SLE-SERVER-12-SP2-BCL-2019-2984
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not\n enforce CAP_NET_RAW, which meant that unprivileged users could create a raw\n socket (bnc#1152782).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,\n which caused an i_size_read() infinite loop and denial of service on SMP\n systems (bnc#1151347).\n\n- CVE-2019-15902: A backporting issue was discovered that re-introduced the\n Spectre vulnerability it had aimed to eliminate. This occurred because the\n backport process depends on cherry picking specific commits, and because two\n (correctly ordered) code lines were swapped (bnc#1149376).\n\n- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused\n by a malicious USB device (bnc#1146519).\n\n- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused\n to cause denial of service (bnc#1148938).\n\n- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a\n process that wants to create a ptrace relationship, which allowed local users\n to obtain root access by leveraging certain scenarios with a parent-child\n process relationship, where a parent drops privileges and calls execve\n (potentially allowing control by an attacker). (bnc#1140671).\n\n- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel\u0027s kvm\n hypervisor. An unprivileged host user or process with access to \u0027/dev/kvm\u0027\n device could use this flaw to crash the host kernel, resulting in a denial of\n service or potentially escalating privileges on the system (bnc#1151350).\n\n- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by\n crafted USB device traffic (bnc#1147122).\n\n- CVE-2017-18595: A double free in allocate_trace_buffer was fixed\n (bnc#1149555).\n\n- CVE-2019-14835: A buffer overflow flaw was found in the kernel\u0027s vhost\n functionality that translates virtqueue buffers to IOVs. A privileged guest\n user able to pass descriptors with invalid length to the host could use this\n flaw to increase their privileges on the host (bnc#1150112).\n\n- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious\n USB device (bnc#1146361).\n\n- CVE-2019-15924: A a NULL pointer dereference has been fixed in the\n drivers/net/ethernet/intel/fm10k module (bnc#1149612).\n\n- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been\n fixed. This issue could lead to local escalation of privilege with System\n execution privileges needed. (bnc#1150025).\n\n- CVE-2019-15926: An out-of-bounds access was fixed in the\n drivers/net/wireless/ath/ath6kl module. (bnc#1149527).\n\n- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer\n module (bnc#1149522).\n\n- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm\n module that could cause denial of service (bnc#1148394).\n\n- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by\n a malicious USB device (bnc#1146519 1146524).\n\n- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a\n malicious USB device (bnc#1146519 1146526).\n\n- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by\n a malicious USB device (bnc#1146519 1146529).\n\n- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi\n chip driver. That issue allowed local users to cause a denial of service\n (system crash) or possibly execute arbitrary code (bnc#1146512).\n\n- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed\n (bsc#1146512, bsc#1146514, bsc#1146516).\n\n- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver\n was fixed. Local users would have abused this issue to cause a denial of\n service (system crash) or possibly execute arbitrary code (bnc#1146516).\n\n- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket\n option, an attacker could control a pointer in kernel land and cause an\n inet_csk_listen_stop general protection fault, or potentially execute\n arbitrary code under certain circumstances. The issue can be triggered as\n root (e.g., inside a default LXC container or with the CAP_NET_ADMIN\n capability) or after namespace unsharing. (bnc#1145477)\n\n- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently\n low encryption key length and did not prevent an attacker from influencing\n the key length negotiation. This allowed practical brute-force attacks (aka\n \u0027KNOB\u0027) that could decrypt traffic and inject arbitrary ciphertext without\n the victim noticing (bnc#1137865).\n\n- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was\n fixed (bnc#1146378).\n\n- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe\n was fixed (bsc#1146378).\n\n- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver\n (bnc#1146391).\n\n- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc\n (bnc#1146584).\n\n- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/v4l2-core driver (bnc#1146519).\n\n- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB\n device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).\n\n- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed\n (bnc#1146519).\n\n- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device\n was fixed in the drivers/media/usb/siano driver (bnc#1146413).\n\n- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).\n\n- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver\n (bnc#1146285).\n\n- CVE-2019-0154: An unprotected read access to i915 registers has been fixed\n that could have been abused to facilitate a local denial-of-service attack.\n (bsc#1135966)\n\n- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the\n i915 module that allowed batch buffers from user mode to gain super user\n privileges. (bsc#1135967)\n\n- CVE-2019-16231: The fjes driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bnc#1150466)\n\n- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have lead to a denial of service or possibly unspecified other impact (bsc#1156187)\n\n- CVE-2019-18680: A NULL pointer dereference in rds_tcp_kill_sock() could cause denial of service (bnc#1155898)\n\nThe following non-security bugs were fixed:\n\n- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).\n- documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/core: array_index_nospec: Sanitize speculative array (bsc#1155671)\n- ipv6: Update ipv6 defrag code (add bsc#1141054).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm kABI Fix for NX patches (bsc#1117665).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: MMU: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).\n- kvm: MMU: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).\n- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).\n- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).\n- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).\n- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- kvm: x86: simplify ept_misconfig (bsc#1117665).\n- media: smsusb: better handle optional alignment (bsc#1146413).\n- mm: use upstream patch for bsc#1106913\n- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878)\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1068032, bsc#1092497).\n- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bsc#1150223).\n- x86/mitigations: Backport the STIBP pile See bsc#1139550\n- xen-blkfront: avoid ENOMEM in blkif_recover after migration (bsc#1149849).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2984,SUSE-OpenStack-Cloud-7-2019-2984,SUSE-SLE-HA-12-SP2-2019-2984,SUSE-SLE-SAP-12-SP2-2019-2984,SUSE-SLE-SERVER-12-SP2-2019-2984,SUSE-SLE-SERVER-12-SP2-BCL-2019-2984", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2984-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2984-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2984-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1084878", "url": "https://bugzilla.suse.com/1084878" }, { "category": "self", "summary": "SUSE Bug 1092497", "url": "https://bugzilla.suse.com/1092497" }, { "category": "self", "summary": "SUSE Bug 1106913", "url": "https://bugzilla.suse.com/1106913" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1135966", "url": "https://bugzilla.suse.com/1135966" }, { "category": "self", "summary": "SUSE Bug 1135967", "url": "https://bugzilla.suse.com/1135967" }, { "category": "self", "summary": "SUSE Bug 1137865", "url": "https://bugzilla.suse.com/1137865" }, { "category": "self", "summary": "SUSE Bug 1139550", "url": "https://bugzilla.suse.com/1139550" }, { "category": "self", "summary": "SUSE Bug 1140671", "url": "https://bugzilla.suse.com/1140671" }, { "category": "self", "summary": "SUSE Bug 1141054", "url": "https://bugzilla.suse.com/1141054" }, { "category": "self", "summary": "SUSE Bug 1144338", "url": "https://bugzilla.suse.com/1144338" }, { "category": "self", "summary": "SUSE Bug 1144903", "url": "https://bugzilla.suse.com/1144903" }, { "category": "self", "summary": "SUSE Bug 1145477", "url": "https://bugzilla.suse.com/1145477" }, { "category": "self", "summary": "SUSE Bug 1146285", "url": "https://bugzilla.suse.com/1146285" }, { "category": "self", "summary": "SUSE Bug 1146361", "url": "https://bugzilla.suse.com/1146361" }, { "category": "self", "summary": "SUSE Bug 1146378", "url": "https://bugzilla.suse.com/1146378" }, { "category": "self", "summary": "SUSE Bug 1146391", "url": "https://bugzilla.suse.com/1146391" }, { "category": "self", "summary": "SUSE Bug 1146413", "url": "https://bugzilla.suse.com/1146413" }, { "category": "self", "summary": "SUSE Bug 1146425", "url": "https://bugzilla.suse.com/1146425" }, { "category": "self", "summary": "SUSE Bug 1146512", "url": "https://bugzilla.suse.com/1146512" }, { "category": "self", "summary": "SUSE Bug 1146514", "url": "https://bugzilla.suse.com/1146514" }, { "category": "self", "summary": "SUSE Bug 1146516", "url": "https://bugzilla.suse.com/1146516" }, { "category": "self", "summary": "SUSE Bug 1146519", "url": "https://bugzilla.suse.com/1146519" }, { "category": "self", "summary": "SUSE Bug 1146584", "url": "https://bugzilla.suse.com/1146584" }, { "category": "self", "summary": "SUSE Bug 1147122", "url": "https://bugzilla.suse.com/1147122" }, { "category": "self", "summary": "SUSE Bug 1148394", "url": "https://bugzilla.suse.com/1148394" }, { "category": "self", "summary": "SUSE Bug 1148938", "url": "https://bugzilla.suse.com/1148938" }, { "category": "self", "summary": "SUSE Bug 1149376", "url": "https://bugzilla.suse.com/1149376" }, { "category": "self", "summary": "SUSE Bug 1149522", "url": "https://bugzilla.suse.com/1149522" }, { "category": "self", "summary": "SUSE Bug 1149527", "url": "https://bugzilla.suse.com/1149527" }, { "category": "self", "summary": "SUSE Bug 1149555", "url": "https://bugzilla.suse.com/1149555" }, { "category": "self", "summary": "SUSE Bug 1149612", "url": "https://bugzilla.suse.com/1149612" }, { "category": "self", "summary": "SUSE Bug 1149849", "url": "https://bugzilla.suse.com/1149849" }, { "category": "self", "summary": "SUSE Bug 1150025", "url": "https://bugzilla.suse.com/1150025" }, { "category": "self", "summary": "SUSE Bug 1150112", "url": "https://bugzilla.suse.com/1150112" }, { "category": "self", "summary": "SUSE Bug 1150223", "url": "https://bugzilla.suse.com/1150223" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150457", "url": "https://bugzilla.suse.com/1150457" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150466", "url": "https://bugzilla.suse.com/1150466" }, { "category": "self", "summary": "SUSE Bug 1151347", "url": "https://bugzilla.suse.com/1151347" }, { "category": "self", "summary": "SUSE Bug 1151350", "url": "https://bugzilla.suse.com/1151350" }, { "category": "self", "summary": "SUSE Bug 1152685", "url": "https://bugzilla.suse.com/1152685" }, { "category": "self", "summary": "SUSE Bug 1152782", "url": "https://bugzilla.suse.com/1152782" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1155671", "url": "https://bugzilla.suse.com/1155671" }, { "category": "self", "summary": "SUSE Bug 1155898", "url": "https://bugzilla.suse.com/1155898" }, { "category": "self", "summary": "SUSE Bug 1156187", "url": "https://bugzilla.suse.com/1156187" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10906 page", "url": "https://www.suse.com/security/cve/CVE-2016-10906/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18509 page", "url": "https://www.suse.com/security/cve/CVE-2017-18509/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18595 page", "url": "https://www.suse.com/security/cve/CVE-2017-18595/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12207 page", "url": "https://www.suse.com/security/cve/CVE-2018-12207/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20976 page", "url": "https://www.suse.com/security/cve/CVE-2018-20976/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-0154 page", "url": "https://www.suse.com/security/cve/CVE-2019-0154/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-0155 page", "url": "https://www.suse.com/security/cve/CVE-2019-0155/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11135 page", "url": "https://www.suse.com/security/cve/CVE-2019-11135/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13272 page", "url": "https://www.suse.com/security/cve/CVE-2019-13272/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14815 page", "url": "https://www.suse.com/security/cve/CVE-2019-14815/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14816 page", "url": "https://www.suse.com/security/cve/CVE-2019-14816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14821 page", "url": "https://www.suse.com/security/cve/CVE-2019-14821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14835 page", "url": "https://www.suse.com/security/cve/CVE-2019-14835/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15211 page", "url": "https://www.suse.com/security/cve/CVE-2019-15211/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15212 page", "url": "https://www.suse.com/security/cve/CVE-2019-15212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15214 page", "url": "https://www.suse.com/security/cve/CVE-2019-15214/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15215 page", "url": "https://www.suse.com/security/cve/CVE-2019-15215/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15216 page", "url": "https://www.suse.com/security/cve/CVE-2019-15216/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15217 page", "url": "https://www.suse.com/security/cve/CVE-2019-15217/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15218 page", "url": "https://www.suse.com/security/cve/CVE-2019-15218/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15219 page", "url": "https://www.suse.com/security/cve/CVE-2019-15219/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15220 page", "url": "https://www.suse.com/security/cve/CVE-2019-15220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15221 page", "url": "https://www.suse.com/security/cve/CVE-2019-15221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15291 page", "url": "https://www.suse.com/security/cve/CVE-2019-15291/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15505 page", "url": "https://www.suse.com/security/cve/CVE-2019-15505/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15666 page", "url": "https://www.suse.com/security/cve/CVE-2019-15666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15807 page", "url": "https://www.suse.com/security/cve/CVE-2019-15807/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15924 page", "url": "https://www.suse.com/security/cve/CVE-2019-15924/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15926 page", "url": "https://www.suse.com/security/cve/CVE-2019-15926/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15927 page", "url": "https://www.suse.com/security/cve/CVE-2019-15927/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16233 page", "url": "https://www.suse.com/security/cve/CVE-2019-16233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16413 page", "url": "https://www.suse.com/security/cve/CVE-2019-16413/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16995 page", "url": "https://www.suse.com/security/cve/CVE-2019-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17055 page", "url": "https://www.suse.com/security/cve/CVE-2019-17055/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18680 page", "url": "https://www.suse.com/security/cve/CVE-2019-18680/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18805 page", "url": "https://www.suse.com/security/cve/CVE-2019-18805/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9456 page", "url": "https://www.suse.com/security/cve/CVE-2019-9456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9506 page", "url": "https://www.suse.com/security/cve/CVE-2019-9506/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-11-20T10:32:05Z", "generator": { "date": "2019-11-20T10:32:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2984-1", "initial_release_date": "2019-11-20T10:32:05Z", "revision_history": [ { "date": "2019-11-20T10:32:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.125.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.125.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.125.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.125.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.125.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.125.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.125.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.125.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.125.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.125.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.125.1.aarch64", "product_id": "kernel-default-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.125.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.125.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.125.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.125.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.125.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.125.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.125.1.aarch64", "product_id": "kernel-syms-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.125.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.125.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.125.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.125.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.125.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.125.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.125.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.125.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.125.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.125.1.noarch", "product_id": "kernel-devel-4.4.121-92.125.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.125.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.125.1.noarch", "product_id": "kernel-docs-4.4.121-92.125.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.125.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.125.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.125.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.125.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.125.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.125.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.125.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.125.1.noarch", "product_id": "kernel-macros-4.4.121-92.125.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.125.1.noarch", "product": { "name": "kernel-source-4.4.121-92.125.1.noarch", "product_id": "kernel-source-4.4.121-92.125.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.125.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.125.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.125.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.125.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.125.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.125.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.125.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.125.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.125.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.125.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.125.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.125.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.125.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.125.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.125.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.125.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.125.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.125.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.125.1.ppc64le", "product_id": "kernel-default-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.125.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.125.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.125.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.125.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.125.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.125.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.125.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.125.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.125.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.125.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.125.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.125.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.125.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.125.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.125.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.125.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.125.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.125.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.125.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.125.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.125.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.125.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.125.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.125.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.125.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.125.1.s390x", "product": { "name": "kernel-default-4.4.121-92.125.1.s390x", "product_id": "kernel-default-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.125.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.125.1.s390x", "product_id": "kernel-default-base-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.125.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.125.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.125.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.125.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.125.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.125.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.125.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.125.1.s390x", "product_id": "kernel-default-man-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.125.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.125.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.125.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.125.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.125.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.125.1.s390x", "product_id": "kernel-syms-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.125.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.125.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.125.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.125.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.125.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.125.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.125.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.125.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.125.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.125.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.125.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.125.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.125.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.125.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.125.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.125.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.125.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.125.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.125.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.125.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.125.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.125.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.125.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.125.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.125.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.125.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.125.1.x86_64", "product_id": "kernel-debug-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.125.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.125.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.125.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.125.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.125.1.x86_64", "product_id": "kernel-default-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.125.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.125.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.125.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.125.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.125.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.125.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.125.1.x86_64", "product_id": "kernel-syms-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.125.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.125.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.125.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.125.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.125.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.125.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.125.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.125.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10906", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10906" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10906", "url": "https://www.suse.com/security/cve/CVE-2016-10906" }, { "category": "external", "summary": "SUSE Bug 1146584 for CVE-2016-10906", "url": "https://bugzilla.suse.com/1146584" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2016-10906" }, { "cve": "CVE-2017-18509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18509" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18509", "url": "https://www.suse.com/security/cve/CVE-2017-18509" }, { "category": "external", "summary": "SUSE Bug 1145477 for CVE-2017-18509", "url": "https://bugzilla.suse.com/1145477" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2017-18509" }, { "cve": "CVE-2017-18595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18595" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18595", "url": "https://www.suse.com/security/cve/CVE-2017-18595" }, { "category": "external", "summary": "SUSE Bug 1149555 for CVE-2017-18595", "url": "https://bugzilla.suse.com/1149555" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2017-18595" }, { "cve": "CVE-2018-12207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12207" } ], "notes": [ { "category": "general", "text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12207", "url": "https://www.suse.com/security/cve/CVE-2018-12207" }, { "category": "external", "summary": "SUSE Bug 1117665 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1117665" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1155812 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155812" }, { "category": "external", "summary": "SUSE Bug 1155817 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155817" }, { "category": "external", "summary": "SUSE Bug 1155945 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155945" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2018-12207" }, { "cve": "CVE-2018-20976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20976" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20976", "url": "https://www.suse.com/security/cve/CVE-2018-20976" }, { "category": "external", "summary": "SUSE Bug 1146285 for CVE-2018-20976", "url": "https://bugzilla.suse.com/1146285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2018-20976" }, { "cve": "CVE-2019-0154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-0154" } ], "notes": [ { "category": "general", "text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-0154", "url": "https://www.suse.com/security/cve/CVE-2019-0154" }, { "category": "external", "summary": "SUSE Bug 1135966 for CVE-2019-0154", "url": "https://bugzilla.suse.com/1135966" }, { "category": "external", "summary": "SUSE Bug 1181720 for CVE-2019-0154", "url": "https://bugzilla.suse.com/1181720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-0154" }, { "cve": "CVE-2019-0155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-0155" } ], "notes": [ { "category": "general", "text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-0155", "url": "https://www.suse.com/security/cve/CVE-2019-0155" }, { "category": "external", "summary": "SUSE Bug 1135966 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135966" }, { "category": "external", "summary": "SUSE Bug 1135967 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1135967" }, { "category": "external", "summary": "SUSE Bug 1173663 for CVE-2019-0155", "url": "https://bugzilla.suse.com/1173663" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-0155" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-11135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11135" } ], "notes": [ { "category": "general", "text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11135", "url": "https://www.suse.com/security/cve/CVE-2019-11135" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152497 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152497" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1152506 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152506" }, { "category": "external", "summary": "SUSE Bug 1160120 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1160120" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-11135" }, { "cve": "CVE-2019-13272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13272" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13272", "url": "https://www.suse.com/security/cve/CVE-2019-13272" }, { "category": "external", "summary": "SUSE Bug 1140671 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1140671" }, { "category": "external", "summary": "SUSE Bug 1156321 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1156321" }, { "category": "external", "summary": "SUSE Bug 1198122 for CVE-2019-13272", "url": "https://bugzilla.suse.com/1198122" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-13272" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14815" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14815", "url": "https://www.suse.com/security/cve/CVE-2019-14815" }, { "category": "external", "summary": "SUSE Bug 1146514 for CVE-2019-14815", "url": "https://bugzilla.suse.com/1146514" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14815", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-14815" }, { "cve": "CVE-2019-14816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14816" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14816", "url": "https://www.suse.com/security/cve/CVE-2019-14816" }, { "category": "external", "summary": "SUSE Bug 1146516 for CVE-2019-14816", "url": "https://bugzilla.suse.com/1146516" }, { "category": "external", "summary": "SUSE Bug 1173666 for CVE-2019-14816", "url": "https://bugzilla.suse.com/1173666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-14816" }, { "cve": "CVE-2019-14821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14821" } ], "notes": [ { "category": "general", "text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14821", "url": "https://www.suse.com/security/cve/CVE-2019-14821" }, { "category": "external", "summary": "SUSE Bug 1151350 for CVE-2019-14821", "url": "https://bugzilla.suse.com/1151350" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2019-14821", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-14821" }, { "cve": "CVE-2019-14835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14835" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14835", "url": "https://www.suse.com/security/cve/CVE-2019-14835" }, { "category": "external", "summary": "SUSE Bug 1150112 for CVE-2019-14835", "url": "https://bugzilla.suse.com/1150112" }, { "category": "external", "summary": "SUSE Bug 1151021 for CVE-2019-14835", "url": "https://bugzilla.suse.com/1151021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-14835" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15211" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15211", "url": "https://www.suse.com/security/cve/CVE-2019-15211" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15211", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15211", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15211", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15211" }, { "cve": "CVE-2019-15212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15212", "url": "https://www.suse.com/security/cve/CVE-2019-15212" }, { "category": "external", "summary": "SUSE Bug 1146391 for CVE-2019-15212", "url": "https://bugzilla.suse.com/1146391" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15212", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15212", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15212", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15212" }, { "cve": "CVE-2019-15214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15214" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15214", "url": "https://www.suse.com/security/cve/CVE-2019-15214" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15214", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146550 for CVE-2019-15214", "url": "https://bugzilla.suse.com/1146550" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15214", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15214", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "low" } ], "title": "CVE-2019-15214" }, { "cve": "CVE-2019-15215", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15215" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15215", "url": "https://www.suse.com/security/cve/CVE-2019-15215" }, { "category": "external", "summary": "SUSE Bug 1146425 for CVE-2019-15215", "url": "https://bugzilla.suse.com/1146425" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15215", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15215", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15215", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15215" }, { "cve": "CVE-2019-15216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15216" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15216", "url": "https://www.suse.com/security/cve/CVE-2019-15216" }, { "category": "external", "summary": "SUSE Bug 1146361 for CVE-2019-15216", "url": "https://bugzilla.suse.com/1146361" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15216", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15216", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15216", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15216" }, { "cve": "CVE-2019-15217", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15217" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15217", "url": "https://www.suse.com/security/cve/CVE-2019-15217" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15217", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146547 for CVE-2019-15217", "url": "https://bugzilla.suse.com/1146547" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15217", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15217", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15217" }, { "cve": "CVE-2019-15218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15218" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15218", "url": "https://www.suse.com/security/cve/CVE-2019-15218" }, { "category": "external", "summary": "SUSE Bug 1146413 for CVE-2019-15218", "url": "https://bugzilla.suse.com/1146413" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15218", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15218", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15218", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15218" }, { "cve": "CVE-2019-15219", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15219" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15219", "url": "https://www.suse.com/security/cve/CVE-2019-15219" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15219", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146524 for CVE-2019-15219", "url": "https://bugzilla.suse.com/1146524" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15219", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15219", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15219" }, { "cve": "CVE-2019-15220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15220" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15220", "url": "https://www.suse.com/security/cve/CVE-2019-15220" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15220", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146526 for CVE-2019-15220", "url": "https://bugzilla.suse.com/1146526" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15220", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15220", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15220" }, { "cve": "CVE-2019-15221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15221" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15221", "url": "https://www.suse.com/security/cve/CVE-2019-15221" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15221", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146529 for CVE-2019-15221", "url": "https://bugzilla.suse.com/1146529" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15221", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15221", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15221" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15291", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15291" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15291", "url": "https://www.suse.com/security/cve/CVE-2019-15291" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146540 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1146540" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15291", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15291" }, { "cve": "CVE-2019-15505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15505" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15505", "url": "https://www.suse.com/security/cve/CVE-2019-15505" }, { "category": "external", "summary": "SUSE Bug 1147122 for CVE-2019-15505", "url": "https://bugzilla.suse.com/1147122" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15505" }, { "cve": "CVE-2019-15666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15666" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15666", "url": "https://www.suse.com/security/cve/CVE-2019-15666" }, { "category": "external", "summary": "SUSE Bug 1148394 for CVE-2019-15666", "url": "https://bugzilla.suse.com/1148394" }, { "category": "external", "summary": "SUSE Bug 1172140 for CVE-2019-15666", "url": "https://bugzilla.suse.com/1172140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-15666" }, { "cve": "CVE-2019-15807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15807" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15807", "url": "https://www.suse.com/security/cve/CVE-2019-15807" }, { "category": "external", "summary": "SUSE Bug 1148938 for CVE-2019-15807", "url": "https://bugzilla.suse.com/1148938" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15807" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-15924", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15924" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15924", "url": "https://www.suse.com/security/cve/CVE-2019-15924" }, { "category": "external", "summary": "SUSE Bug 1149612 for CVE-2019-15924", "url": "https://bugzilla.suse.com/1149612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "low" } ], "title": "CVE-2019-15924" }, { "cve": "CVE-2019-15926", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15926" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15926", "url": "https://www.suse.com/security/cve/CVE-2019-15926" }, { "category": "external", "summary": "SUSE Bug 1149527 for CVE-2019-15926", "url": "https://bugzilla.suse.com/1149527" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15926" }, { "cve": "CVE-2019-15927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15927" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15927", "url": "https://www.suse.com/security/cve/CVE-2019-15927" }, { "category": "external", "summary": "SUSE Bug 1149522 for CVE-2019-15927", "url": "https://bugzilla.suse.com/1149522" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-15927" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "low" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16233" } ], "notes": [ { "category": "general", "text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16233", "url": "https://www.suse.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "SUSE Bug 1150457 for CVE-2019-16233", "url": "https://bugzilla.suse.com/1150457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "low" } ], "title": "CVE-2019-16233" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-16413", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16413" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16413", "url": "https://www.suse.com/security/cve/CVE-2019-16413" }, { "category": "external", "summary": "SUSE Bug 1151347 for CVE-2019-16413", "url": "https://bugzilla.suse.com/1151347" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-16413" }, { "cve": "CVE-2019-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16995" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16995", "url": "https://www.suse.com/security/cve/CVE-2019-16995" }, { "category": "external", "summary": "SUSE Bug 1152685 for CVE-2019-16995", "url": "https://bugzilla.suse.com/1152685" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-16995" }, { "cve": "CVE-2019-17055", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17055" } ], "notes": [ { "category": "general", "text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17055", "url": "https://www.suse.com/security/cve/CVE-2019-17055" }, { "category": "external", "summary": "SUSE Bug 1152782 for CVE-2019-17055", "url": "https://bugzilla.suse.com/1152782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "low" } ], "title": "CVE-2019-17055" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18680", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18680" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18680", "url": "https://www.suse.com/security/cve/CVE-2019-18680" }, { "category": "external", "summary": "SUSE Bug 1155898 for CVE-2019-18680", "url": "https://bugzilla.suse.com/1155898" }, { "category": "external", "summary": "SUSE Bug 1173867 for CVE-2019-18680", "url": "https://bugzilla.suse.com/1173867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "important" } ], "title": "CVE-2019-18680" }, { "cve": "CVE-2019-18805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18805" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18805", "url": "https://www.suse.com/security/cve/CVE-2019-18805" }, { "category": "external", "summary": "SUSE Bug 1156187 for CVE-2019-18805", "url": "https://bugzilla.suse.com/1156187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "low" } ], "title": "CVE-2019-18805" }, { "cve": "CVE-2019-9456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9456" } ], "notes": [ { "category": "general", "text": "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9456", "url": "https://www.suse.com/security/cve/CVE-2019-9456" }, { "category": "external", "summary": "SUSE Bug 1150025 for CVE-2019-9456", "url": "https://bugzilla.suse.com/1150025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-9456" }, { "cve": "CVE-2019-9506", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9506" } ], "notes": [ { "category": "general", "text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9506", "url": "https://www.suse.com/security/cve/CVE-2019-9506" }, { "category": "external", "summary": "SUSE Bug 1137865 for CVE-2019-9506", "url": "https://bugzilla.suse.com/1137865" }, { "category": "external", "summary": "SUSE Bug 1146042 for CVE-2019-9506", "url": "https://bugzilla.suse.com/1146042" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-20T10:32:05Z", "details": "moderate" } ], "title": "CVE-2019-9506" } ] }
suse-su-2019:2951-1
Vulnerability from csaf_suse
Published
2019-11-12 18:12
Modified
2019-11-12 18:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race
condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine
Exception during Page Size Change, causing the CPU core to be non-functional.
The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in
executable pages by splitting / merging huge pages into small pages as
needed.
More information can be found on https://www.suse.com/support/kb/doc/?id=7023735
- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with
Transactional Memory support could be used to facilitate sidechannel
information leaks out of microarchitectural buffers, similar to the
previously described 'Microarchitectural Data Sampling' attack.
The Linux kernel was supplemented with the option to disable TSX operation
altogether (requiring CPU Microcode updates on older systems) and better
flushing of microarchitectural buffers (VERW).
The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251
- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port
failed to add a port, which may have caused denial of service (bsc#1152685).
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
alloc_workqueue return value, leading to a NULL pointer dereference.
(bsc#1150457).
- CVE-2019-10220: Added sanity checks on the pathnames passed to the user
space. (bsc#1144903).
- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).
- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell
libertas driver (bsc#1150465).
- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return
value, leading to a NULL pointer dereference. (bsc#1150452).
- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,
leading to a Buffer Overflow (bsc#1153158).
- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which
meant that unprivileged users could create a raw socket (bsc#1152788).
- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have
lead to a denial of service or possibly unspecified other impact (bsc#1156187)
- CVE-2019-17055: The AF_ISDN network module did not enforce CAP_NET_RAW, which meant
that unprivileged users could create a raw socket (bnc#1152782)
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES='xz' in config.sh, then mkspec will pass it to the spec file.
- acpi / CPPC: do not require the _PSD method (bsc#1051510).
- acpi / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- acpi: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).
- alsa: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- alsa: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- alsa: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- alsa: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- alsa: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- alsa: hda - Inform too slow responses (bsc#1051510).
- alsa: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- alsa: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).
- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).
- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).
- alsa: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- alsa: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).
- alsa: hda/realtek - Fix alienware headset mic (bsc#1051510).
- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- alsa: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- alsa: hda: Add Elkhart Lake pci ID (bsc#1051510).
- alsa: hda: Add Tigerlake/Jasperlake pci ID (bsc#1051510).
- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).
- alsa: hda: Flush interrupts on disabling (bsc#1051510).
- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).
- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).
- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).
- asoc: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- asoc: Intel: NHLT: Fix debug print format (bsc#1051510).
- asoc: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).
- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).
- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- boot: Sign non-x86 kernels when possible (boo#1134303)
- bpf: fix use after free in prog symbol exposure (bsc#1083647).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).
- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).
- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).
- crypto: af_alg - consolidation of duplicate code (bsc#1154737).
- crypto: af_alg - fix race accessing cipher request (bsc#1154737).
- crypto: af_alg - remove locking in async callback (bsc#1154737).
- crypto: af_alg - update correct dst SGL entry (bsc#1051510).
- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).
- crypto: algif - return error code when no data was processed (bsc#1154737).
- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).
- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).
- crypto: algif_aead - overhaul memory management (bsc#1154737).
- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).
- crypto: algif_skcipher - overhaul memory management (bsc#1154737).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).
- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).
- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)
- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)
- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)
- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)
- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)
- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)
- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)
- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)
- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)
- drm/i915: Allow parsing of unsized batches (bsc#1135967)
- drm/i915: Disable Secure Batches for gen6+
- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)
- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)
- drm/i915: Remove Master tables from cmdparser
- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)
- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).
- efi: cper: print AER info of pcie fatal error (bsc#1051510).
- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- hid: apple: Fix stuck function keys when using FN (bsc#1051510).
- hid: fix error message in hid_open_report() (bsc#1051510).
- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).
- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).
- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- hso: fix NULL-deref on tty open (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- ib/core: Add mitigation for Spectre V1 (bsc#1155671)
- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: ca8210: prevent memory leak (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- input: Revert synaptics-rmi4 patch due to regression (bsc#1155982)
- input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).
- integrity: prevent deadlock during digsig verification (bsc#1090631).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).
- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).
- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- kABI workaround for crypto/af_alg changes (bsc#1154737).
- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).
- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mac80211: Reject malformed SSID elements (bsc#1051510).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- mac80211: fix txq null pointer dereference (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).
- md/raid0: fix warning message for parameter default_layout (bsc#1140090).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).
- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).
- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).
- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).
- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).
- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).
- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).
- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- net_sched: add policy validation for action attributes (networking-stable-19_09_30).
- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- nfc: fix attrs checks in netlink interface (bsc#1051510).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).
- nfs: fix regression (boo#1154189 bsc#1154747).
- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- nl80211: fix null pointer dereference (bsc#1051510).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).
- packaging: add support for riscv64
- pci: Correct pci=resource_alignment parameter example (bsc#1051510).
- pci: PM: Fix pci_power_up() (bsc#1051510).
- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- pci: hv: Use bytes 4 and 5 from instance ID as the pci domain numbers (bsc#1153263).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).
- powerpc/pseries: Remove confusing warning message (bsc#1109158).
- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).
- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).
- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).
- qed: iWARP - Use READ_ONCE and smp_store_release to access ep->state (bsc#1050536 bsc#1050545).
- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).
- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).
- r8152: Set macpassthru in reset_resume callback (bsc#1051510).
- rdma/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- rdma: Fix goto target to release the allocated memory (bsc#1050244).
- rds: Fix warning (bsc#1154848).
- rpm/config.sh: Enable livepatch.
- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.
- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.
- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.
- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)
- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.
- rpm/kernel-binary.spec.in: support partial rt debug config.
- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).
- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.
- rpm/mkspec: Correct tarball URL for rc kernels.
- rpm/mkspec: Make building DTBs optional.
- rpm/modflist: Simplify compression support.
- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.
- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with '.ko' which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize '.ko.xz' in addition to '.ko'.
- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).
- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).
- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).
- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).
- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).
- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).
- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- scripts/arch-symbols: add missing link.
- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).
- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).
- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).
- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).
- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).
- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).
- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).
- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).
- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).
- sctp: Fix the link time qualifier of 'sctp_ctrlsock_exit()' (networking-stable-19_09_15).
- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).
- skge: fix checksum byte order (networking-stable-19_09_30).
- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).
- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).
- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).
- staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS (bsc#1051510).
- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).
- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).
- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).
- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).
- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).
- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).
- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).
- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).
- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).
- tracing: Initialize iter->seq after zeroing in tracing_read_pipe() (bsc#1151508).
- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).
- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).
- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on disconnect (bsc#1142635).
- usb: adutux: fix use-after-free on release (bsc#1051510).
- usb: chaoskey: fix use-after-free on release (bsc#1051510).
- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).
- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- usb: iowarrior: fix use-after-free on release (bsc#1051510).
- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).
- usb: ldusb: fix control-message timeout (bsc#1051510).
- usb: ldusb: fix memleak on disconnect (bsc#1051510).
- usb: ldusb: fix read info leaks (bsc#1051510).
- usb: ldusb: fix ring-buffer locking (bsc#1051510).
- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).
- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).
- usb: legousbtower: fix memleak on disconnect (bsc#1051510).
- usb: legousbtower: fix open after failed reset request (bsc#1142635).
- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- usb: legousbtower: fix slab info leak at probe (bsc#1142635).
- usb: legousbtower: fix use-after-free on release (bsc#1051510).
- usb: microtek: fix info-leak at probe (bsc#1142635).
- usb: serial: fix runtime PM after driver unbind (bsc#1051510).
- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- usb: serial: option: add Telit FN980 compositions (bsc#1051510).
- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).
- usb: serial: whiteheat: fix potential slab corruption (bsc#1051510).
- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).
- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- usb: usblcd: fix I/O after disconnect (bsc#1142635).
- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).
- usb: usblp: fix use-after-free on disconnect (bsc#1051510).
- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).
- usb: yurex: Do not retry on unexpected errors (bsc#1051510).
- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).
- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).
- vfio_pci: Restore original state on release (bsc#1051510).
- vhost_net: conditionally enable tx polling (bsc#1145099).
- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).
- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).
- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).
- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).
- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).
- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).
- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).
- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).
- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).
- xhci: Check all endpoints for LPM timeout (bsc#1051510).
- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).
- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).
- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).
Patchnames
SUSE-2019-2951,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2951,SUSE-SLE-Module-Public-Cloud-15-2019-2951
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed.\n More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have\n lead to a denial of service or possibly unspecified other impact (bsc#1156187)\n- CVE-2019-17055: The AF_ISDN network module did not enforce CAP_NET_RAW, which meant\n that unprivileged users could create a raw socket (bnc#1152782)\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES=\u0027xz\u0027 in config.sh, then mkspec will pass it to the spec file.\n- acpi / CPPC: do not require the _PSD method (bsc#1051510).\n- acpi / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- acpi: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- alsa: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- alsa: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- alsa: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- alsa: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- alsa: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- alsa: hda - Inform too slow responses (bsc#1051510).\n- alsa: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- alsa: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).\n- alsa: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- alsa: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- alsa: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- alsa: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- alsa: hda: Add Elkhart Lake pci ID (bsc#1051510).\n- alsa: hda: Add Tigerlake/Jasperlake pci ID (bsc#1051510).\n- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).\n- alsa: hda: Flush interrupts on disabling (bsc#1051510).\n- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).\n- asoc: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- asoc: Intel: NHLT: Fix debug print format (bsc#1051510).\n- asoc: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- boot: Sign non-x86 kernels when possible (boo#1134303)\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of pcie fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- hid: apple: Fix stuck function keys when using FN (bsc#1051510).\n- hid: fix error message in hid_open_report() (bsc#1051510).\n- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- input: Revert synaptics-rmi4 patch due to regression (bsc#1155982)\n- input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- nfs: fix regression (boo#1154189 bsc#1154747).\n- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- pci: Correct pci=resource_alignment parameter example (bsc#1051510).\n- pci: PM: Fix pci_power_up() (bsc#1051510).\n- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- pci: hv: Use bytes 4 and 5 from instance ID as the pci domain numbers (bsc#1153263).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rdma/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- rdma: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- rpm/config.sh: Enable livepatch.\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix control-message timeout (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: ldusb: fix ring-buffer locking (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2951,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2951,SUSE-SLE-Module-Public-Cloud-15-2019-2951", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2951-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2951-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2951-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1082635", "url": "https://bugzilla.suse.com/1082635" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1090631", "url": "https://bugzilla.suse.com/1090631" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1096254", "url": "https://bugzilla.suse.com/1096254" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098291", "url": "https://bugzilla.suse.com/1098291" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1117665", "url": "https://bugzilla.suse.com/1117665" }, { "category": "self", "summary": "SUSE Bug 1119461", "url": "https://bugzilla.suse.com/1119461" }, { "category": "self", "summary": "SUSE Bug 1119465", "url": "https://bugzilla.suse.com/1119465" }, { "category": "self", "summary": "SUSE Bug 1123034", "url": "https://bugzilla.suse.com/1123034" }, { "category": "self", "summary": "SUSE Bug 1123080", "url": "https://bugzilla.suse.com/1123080" }, { "category": "self", "summary": "SUSE Bug 1133140", "url": "https://bugzilla.suse.com/1133140" }, { "category": "self", "summary": "SUSE Bug 1134303", "url": "https://bugzilla.suse.com/1134303" }, { "category": "self", "summary": "SUSE Bug 1135642", "url": "https://bugzilla.suse.com/1135642" }, { "category": "self", "summary": "SUSE Bug 1135854", "url": "https://bugzilla.suse.com/1135854" }, { "category": "self", "summary": "SUSE Bug 1135873", "url": "https://bugzilla.suse.com/1135873" }, { "category": "self", "summary": "SUSE Bug 1135967", "url": "https://bugzilla.suse.com/1135967" }, { "category": "self", "summary": "SUSE Bug 1137040", "url": "https://bugzilla.suse.com/1137040" }, { "category": "self", "summary": "SUSE Bug 1137799", "url": "https://bugzilla.suse.com/1137799" }, { "category": "self", "summary": "SUSE Bug 1138190", "url": "https://bugzilla.suse.com/1138190" }, { "category": "self", "summary": "SUSE Bug 1140090", "url": "https://bugzilla.suse.com/1140090" }, { "category": "self", "summary": "SUSE Bug 1140729", "url": "https://bugzilla.suse.com/1140729" }, { "category": "self", "summary": "SUSE Bug 1140845", "url": "https://bugzilla.suse.com/1140845" }, { "category": "self", "summary": "SUSE Bug 1140883", "url": "https://bugzilla.suse.com/1140883" }, { "category": "self", "summary": "SUSE Bug 1141600", "url": "https://bugzilla.suse.com/1141600" }, { "category": "self", "summary": "SUSE Bug 1142635", "url": "https://bugzilla.suse.com/1142635" }, { "category": "self", "summary": "SUSE Bug 1142667", "url": "https://bugzilla.suse.com/1142667" }, { "category": "self", "summary": "SUSE Bug 1143706", "url": "https://bugzilla.suse.com/1143706" }, { "category": "self", "summary": "SUSE Bug 1144338", "url": "https://bugzilla.suse.com/1144338" }, { "category": "self", "summary": "SUSE Bug 1144375", "url": "https://bugzilla.suse.com/1144375" }, { "category": "self", "summary": "SUSE Bug 1144449", "url": "https://bugzilla.suse.com/1144449" }, { "category": "self", "summary": "SUSE Bug 1144903", "url": "https://bugzilla.suse.com/1144903" }, { "category": "self", "summary": "SUSE Bug 1145099", "url": "https://bugzilla.suse.com/1145099" }, { "category": "self", "summary": "SUSE Bug 1146612", "url": "https://bugzilla.suse.com/1146612" }, { "category": "self", "summary": "SUSE Bug 1148410", "url": "https://bugzilla.suse.com/1148410" }, { "category": "self", "summary": "SUSE Bug 1149119", "url": "https://bugzilla.suse.com/1149119" }, { "category": "self", "summary": "SUSE Bug 1150452", "url": "https://bugzilla.suse.com/1150452" }, { "category": "self", "summary": "SUSE Bug 1150457", "url": "https://bugzilla.suse.com/1150457" }, { "category": "self", "summary": "SUSE Bug 1150465", "url": "https://bugzilla.suse.com/1150465" }, { "category": "self", "summary": "SUSE Bug 1150875", "url": "https://bugzilla.suse.com/1150875" }, { "category": "self", "summary": "SUSE Bug 1151508", "url": "https://bugzilla.suse.com/1151508" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1152685", "url": "https://bugzilla.suse.com/1152685" }, { "category": "self", "summary": "SUSE Bug 1152782", "url": "https://bugzilla.suse.com/1152782" }, { "category": "self", "summary": "SUSE Bug 1152788", "url": "https://bugzilla.suse.com/1152788" }, { "category": "self", "summary": "SUSE Bug 1152791", "url": "https://bugzilla.suse.com/1152791" }, { "category": "self", "summary": "SUSE Bug 1153112", "url": "https://bugzilla.suse.com/1153112" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153236", "url": "https://bugzilla.suse.com/1153236" }, { "category": "self", "summary": "SUSE Bug 1153263", "url": "https://bugzilla.suse.com/1153263" }, { "category": "self", "summary": "SUSE Bug 1153476", "url": "https://bugzilla.suse.com/1153476" }, { "category": "self", "summary": "SUSE Bug 1153509", "url": "https://bugzilla.suse.com/1153509" }, { "category": "self", "summary": "SUSE Bug 1153646", "url": "https://bugzilla.suse.com/1153646" }, { "category": "self", "summary": "SUSE Bug 1153681", "url": "https://bugzilla.suse.com/1153681" }, { "category": "self", "summary": "SUSE Bug 1153713", "url": "https://bugzilla.suse.com/1153713" }, { "category": "self", "summary": "SUSE Bug 1153717", "url": "https://bugzilla.suse.com/1153717" }, { "category": "self", "summary": "SUSE Bug 1153718", "url": "https://bugzilla.suse.com/1153718" }, { "category": "self", "summary": "SUSE Bug 1153719", "url": "https://bugzilla.suse.com/1153719" }, { "category": "self", "summary": "SUSE Bug 1153811", "url": "https://bugzilla.suse.com/1153811" }, { "category": "self", "summary": "SUSE Bug 1153969", "url": "https://bugzilla.suse.com/1153969" }, { "category": "self", "summary": "SUSE Bug 1154108", "url": "https://bugzilla.suse.com/1154108" }, { "category": "self", "summary": "SUSE Bug 1154189", "url": "https://bugzilla.suse.com/1154189" }, { "category": "self", "summary": "SUSE Bug 1154354", "url": "https://bugzilla.suse.com/1154354" }, { "category": "self", "summary": "SUSE Bug 1154372", "url": "https://bugzilla.suse.com/1154372" }, { "category": "self", "summary": "SUSE Bug 1154578", "url": "https://bugzilla.suse.com/1154578" }, { "category": "self", "summary": "SUSE Bug 1154607", "url": "https://bugzilla.suse.com/1154607" }, { "category": "self", "summary": "SUSE Bug 1154608", "url": "https://bugzilla.suse.com/1154608" }, { "category": "self", "summary": "SUSE Bug 1154610", "url": "https://bugzilla.suse.com/1154610" }, { "category": "self", "summary": "SUSE Bug 1154611", "url": "https://bugzilla.suse.com/1154611" }, { "category": "self", "summary": "SUSE Bug 1154651", "url": "https://bugzilla.suse.com/1154651" }, { "category": "self", "summary": "SUSE Bug 1154737", "url": "https://bugzilla.suse.com/1154737" }, { "category": "self", "summary": "SUSE Bug 1154747", "url": "https://bugzilla.suse.com/1154747" }, { "category": "self", "summary": "SUSE Bug 1154848", "url": "https://bugzilla.suse.com/1154848" }, { "category": "self", "summary": "SUSE Bug 1154858", "url": "https://bugzilla.suse.com/1154858" }, { "category": "self", "summary": "SUSE Bug 1154905", "url": "https://bugzilla.suse.com/1154905" }, { "category": "self", "summary": "SUSE Bug 1154956", "url": "https://bugzilla.suse.com/1154956" }, { "category": "self", "summary": "SUSE Bug 1155178", "url": "https://bugzilla.suse.com/1155178" }, { "category": "self", "summary": "SUSE Bug 1155179", "url": "https://bugzilla.suse.com/1155179" }, { "category": "self", "summary": "SUSE Bug 1155184", "url": "https://bugzilla.suse.com/1155184" }, { "category": "self", "summary": "SUSE Bug 1155186", "url": "https://bugzilla.suse.com/1155186" }, { "category": "self", "summary": "SUSE Bug 1155671", "url": "https://bugzilla.suse.com/1155671" }, { "category": "self", "summary": "SUSE Bug 1155692", "url": "https://bugzilla.suse.com/1155692" }, { "category": "self", "summary": "SUSE Bug 1155836", "url": "https://bugzilla.suse.com/1155836" }, { "category": "self", "summary": "SUSE Bug 1155982", "url": "https://bugzilla.suse.com/1155982" }, { "category": "self", "summary": "SUSE Bug 1156187", "url": "https://bugzilla.suse.com/1156187" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12207 page", "url": "https://www.suse.com/security/cve/CVE-2018-12207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11135 page", "url": "https://www.suse.com/security/cve/CVE-2019-11135/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16233 page", "url": "https://www.suse.com/security/cve/CVE-2019-16233/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16995 page", "url": "https://www.suse.com/security/cve/CVE-2019-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17055 page", "url": "https://www.suse.com/security/cve/CVE-2019-17055/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17056 page", "url": "https://www.suse.com/security/cve/CVE-2019-17056/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18805 page", "url": "https://www.suse.com/security/cve/CVE-2019-18805/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-11-12T18:12:59Z", "generator": { "date": "2019-11-12T18:12:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2951-1", "initial_release_date": "2019-11-12T18:12:59Z", "revision_history": [ { "date": "2019-11-12T18:12:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-5.44.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-5.44.1.noarch", "product_id": "kernel-devel-azure-4.12.14-5.44.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-5.44.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-5.44.1.noarch", "product_id": "kernel-source-azure-4.12.14-5.44.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-5.44.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-5.44.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-5.44.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-5.44.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-5.44.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-5.44.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-5.44.1.x86_64", "product": { "name": "kernel-azure-4.12.14-5.44.1.x86_64", "product_id": "kernel-azure-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-5.44.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-5.44.1.x86_64", "product_id": "kernel-azure-base-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-5.44.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-5.44.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-5.44.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-5.44.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-5.44.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-5.44.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-5.44.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-5.44.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-5.44.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-5.44.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-5.44.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-5.44.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-5.44.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-5.44.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-5.44.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-5.44.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-5.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-5.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-5.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-5.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-5.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-5.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-5.44.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-5.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-5.44.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-5.44.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-5.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-5.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12207" } ], "notes": [ { "category": "general", "text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12207", "url": "https://www.suse.com/security/cve/CVE-2018-12207" }, { "category": "external", "summary": "SUSE Bug 1117665 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1117665" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1155812 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155812" }, { "category": "external", "summary": "SUSE Bug 1155817 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155817" }, { "category": "external", "summary": "SUSE Bug 1155945 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1155945" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12207", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "moderate" } ], "title": "CVE-2018-12207" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "important" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-11135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11135" } ], "notes": [ { "category": "general", "text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11135", "url": "https://www.suse.com/security/cve/CVE-2019-11135" }, { "category": "external", "summary": "SUSE Bug 1139073 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1139073" }, { "category": "external", "summary": "SUSE Bug 1152497 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152497" }, { "category": "external", "summary": "SUSE Bug 1152505 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152505" }, { "category": "external", "summary": "SUSE Bug 1152506 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1152506" }, { "category": "external", "summary": "SUSE Bug 1160120 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1160120" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11135", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "moderate" } ], "title": "CVE-2019-11135" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "low" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16233" } ], "notes": [ { "category": "general", "text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16233", "url": "https://www.suse.com/security/cve/CVE-2019-16233" }, { "category": "external", "summary": "SUSE Bug 1150457 for CVE-2019-16233", "url": "https://bugzilla.suse.com/1150457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "low" } ], "title": "CVE-2019-16233" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16995" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16995", "url": "https://www.suse.com/security/cve/CVE-2019-16995" }, { "category": "external", "summary": "SUSE Bug 1152685 for CVE-2019-16995", "url": "https://bugzilla.suse.com/1152685" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "moderate" } ], "title": "CVE-2019-16995" }, { "cve": "CVE-2019-17055", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17055" } ], "notes": [ { "category": "general", "text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17055", "url": "https://www.suse.com/security/cve/CVE-2019-17055" }, { "category": "external", "summary": "SUSE Bug 1152782 for CVE-2019-17055", "url": "https://bugzilla.suse.com/1152782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "low" } ], "title": "CVE-2019-17055" }, { "cve": "CVE-2019-17056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17056" } ], "notes": [ { "category": "general", "text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17056", "url": "https://www.suse.com/security/cve/CVE-2019-17056" }, { "category": "external", "summary": "SUSE Bug 1152788 for CVE-2019-17056", "url": "https://bugzilla.suse.com/1152788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "moderate" } ], "title": "CVE-2019-17056" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "important" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18805" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18805", "url": "https://www.suse.com/security/cve/CVE-2019-18805" }, { "category": "external", "summary": "SUSE Bug 1156187 for CVE-2019-18805", "url": "https://bugzilla.suse.com/1156187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-11-12T18:12:59Z", "details": "low" } ], "title": "CVE-2019-18805" } ] }
suse-su-2020:0093-1
Vulnerability from csaf_suse
Published
2020-01-14 10:06
Modified
2020-01-14 10:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-20095: mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c had some error-handling cases that did not free allocated hostcmd memory. This will cause a memory leak and denial of service (bnc#1159909).
- CVE-2019-20054: Fixed a a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).
- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).
- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).
- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).
- CVE-2019-19319: A setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).
- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).
- CVE-2019-18808: A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption) (bnc#1156259).
- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where the length of variable elements in a beacon head were not checked, leading to a buffer overflow (bnc#1152107).
- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).
- CVE-2019-19051: There was a memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1159024).
- CVE-2019-19338: There was an incomplete fix for Transaction Asynchronous Abort (TAA) (bnc#1158954).
- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bnc#1158827).
- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer (bnc#1158904).
- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).
- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).
- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver (bnc#1158893).
- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).
- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).
- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bnc#1158381 1158823 1158834).
- CVE-2019-15213: There was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).
- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).
- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).
- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).
- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).
- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).
- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).
- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (bnc#1158407).
- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).
- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver (bnc#1158381).
- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).
- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).
- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).
- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1156258).
- CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure (bnc#1157304).
- CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157032).
- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).
- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).
- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).
- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157307).
- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157298).
- CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).
- CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157045).
- CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157044).
- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).
- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures (bnc#1157171).
- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).
- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).
- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157178).
- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures (bsc#1157173).
- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures (bnc#1157162).
- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures (bnc#1157145).
- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).
- CVE-2019-19073: Fixed memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).
- CVE-2019-19083: Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157049).
- CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157046).
- CVE-2019-15916: An issue was discovered in the Linux kernel There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).
- CVE-2019-0154: Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1135966).
- CVE-2019-0155: Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may have allowed an authenticated user to potentially enable escalation of privilege via local access (bnc#1135967).
- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).
- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).
- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket (bnc#1152782).
- CVE-2019-16995: In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).
- CVE-2019-11135: TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access (bnc#1139073).
- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).
- CVE-2018-12207: Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may have allowed an authenticated user to potentially enable denial of service of the host system via local access (bnc#1117665).
- CVE-2019-10220: Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists (bnc#1144903).
- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (bnc#1154372).
- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).
- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).
- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).
- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).
- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation (bnc#1151350).
- CVE-2017-18595: An issue was discovered in the Linux kernel A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (bnc#1149555).
- CVE-2019-9506: The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and did not prevent an attacker from influencing the key length negotiation. This allowed practical brute-force attacks (aka 'KNOB') that can decrypt traffic and inject arbitrary ciphertext without the victim noticing (bnc#1146042).
- CVE-2019-14835: A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration (bnc#1150112).
- CVE-2019-9456: Ther is an issue inside the USB monitor driver that can lead to a possible OOB write due to a missing bounds check (bnc#1150025).
- CVE-2019-15031: In the Linux kernel on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt (bnc#1149713).
- CVE-2019-15030: In the Linux kernel on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception (bnc#1149713).
The following non-security bugs were fixed:
- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).
- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).
- ACPI / CPPC: do not require the _PSD method (bsc#1051510).
- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).
- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).
- ACPI / PCI: fix acpi_pci_irq_enable() memory leak (bsc#1051510).
- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).
- ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug bridge (bsc#1111666).
- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).
- ACPI / property: Fix acpi_graph_get_remote_endpoint() name in kerneldoc (bsc#1051510).
- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).
- ACPI: OSL: only free map once in osl.c (bsc#1051510).
- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).
- ACPI: custom_method: fix memory leaks (bsc#1051510).
- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).
- ACPICA: Increase total number of possible Owner IDs (bsc#1148859).
- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).
- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).
- ALSA: 6fire: Drop the dead code (git-fixes).
- ALSA: aoa: onyx: always initialize register read value (bsc#1051510).
- ALSA: bebob: Fix prototype of helper function to return negative value (bsc#1051510).
- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).
- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).
- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).
- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).
- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).
- ALSA: firewire-motu: add support for MOTU 4pre (bsc#1111666).
- ALSA: firewire-tascam: check intermediate state of clock status and retry (bsc#1051510).
- ALSA: firewire-tascam: handle error code when getting current source of clock (bsc#1051510).
- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).
- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).
- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).
- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).
- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).
- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).
- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).
- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).
- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).
- ALSA: hda - Fix potential endless loop at applying quirks (bsc#1051510).
- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).
- ALSA: hda - Inform too slow responses (bsc#1051510).
- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).
- ALSA: hda - fixup for the bass speaker on Lenovo Carbon X1 7th gen (git-fixes).
- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).
- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).
- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).
- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).
- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).
- ALSA: hda/hdmi - Clear codec->relaxed_resume flag at unbinding (git-fixes).
- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).
- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).
- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).
- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).
- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).
- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).
- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).
- ALSA: hda/realtek - Add quirk for HP Pavilion 15 (bsc#1051510).
- ALSA: hda/realtek - Add support for ALC623 (bsc#1051510).
- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).
- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).
- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).
- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).
- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).
- ALSA: hda/realtek - Enable internal speaker and headset mic of ASUS UX431FL (bsc#1051510).
- ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).
- ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop (git-fixes).
- ALSA: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).
- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).
- ALSA: hda/realtek - Fix inverted bass GPIO pin on Acer 8951G (git-fixes).
- ALSA: hda/realtek - Fix overridden device-specific initialization (bsc#1051510).
- ALSA: hda/realtek - Fix the problem of two front mics on a ThinkCentre (bsc#1051510).
- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).
- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).
- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).
- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).
- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).
- ALSA: hda/sigmatel - remove unused variable 'stac9200_core_init' (bsc#1051510).
- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).
- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).
- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).
- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).
- ALSA: hda: Fix racy display power access (bsc#1156928).
- ALSA: hda: Flush interrupts on disabling (bsc#1051510).
- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).
- ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms (git-fixes).
- ALSA: hda: hdmi - remove redundant code comments (git-fixes).
- ALSA: hda: kabi workaround for generic parser flag (bsc#1051510).
- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).
- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).
- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).
- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).
- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).
- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).
- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).
- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).
- ALSA: pcm: Yet another missing check of non-cached buffer type (bsc#1111666).
- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).
- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).
- ALSA: seq: Do error checks at creating system ports (bsc#1051510).
- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).
- ALSA: timer: Fix mutex deadlock at releasing card (bsc#1051510).
- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).
- ALSA: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).
- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).
- ALSA: usb-audio: Add skip_validation option (git-fixes).
- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).
- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).
- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).
- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).
- ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).
- ALSA: usb-audio: Fix copy and paste error in the validator (bsc#1111666).
- ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() (git-fixes).
- ALSA: usb-audio: Fix incorrect size check for processing/extension units (git-fixes).
- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).
- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).
- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).
- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).
- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).
- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).
- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).
- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).
- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).
- ALSA: usb-audio: fix PCM device order (bsc#1051510).
- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).
- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).
- ALSA: usb-audio: remove some dead code (bsc#1051510).
- ALSA: usb-audio: sound: usb: usb true/false for bool return type (git-fixes).
- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).
- ASoC: Intel: Baytrail: Fix implicit fallthrough warning (bsc#1051510).
- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).
- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).
- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).
- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).
- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).
- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).
- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).
- ASoC: dmaengine: Make the pcm->name equal to pcm->id if the name is not set (bsc#1051510).
- ASoC: dpcm: Properly initialise hw->rate_max (bsc#1051510).
- ASoC: es8328: Fix copy-paste error in es8328_right_line_controls (bsc#1051510).
- ASoC: kirkwood: fix external clock probe defer (git-fixes).
- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).
- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).
- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).
- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).
- ASoC: sun4i-i2s: RX and TX counter registers are swapped (bsc#1051510).
- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).
- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).
- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).
- ASoC: wm8737: Fix copy-paste error in wm8737_snd_controls (bsc#1051510).
- ASoC: wm8962: fix lambda value (git-fixes).
- ASoC: wm8988: fix typo in wm8988_right_line_controls (bsc#1051510).
- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).
- Add 3 not-needeed commits to blacklist.conf from git-fixes.
- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).
- Add kernel module compression support (bsc#1135854).
- Add some qedf commits to blacklist file (bsc#1149976).
- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).
- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).
- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).
- Bluetooth: btqca: Add a short delay before downloading the NVM (bsc#1051510).
- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).
- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).
- Bluetooth: delete a stray unlock (bsc#1051510).
- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).
- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).
- Btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).
- Btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).
- Btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).
- Btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- Btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).
- Btrfs: do not abort transaction at btrfs_update_root() after failure to COW path (bsc#1150933).
- Btrfs: fix assertion failure during fsync and use of stale transaction (bsc#1150562).
- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).
- Btrfs: fix use-after-free when using the tree modification log (bsc#1151891).
- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).
- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).
- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).
- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).
- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).
- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).
- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).
- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).
- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).
- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).
- Compile nvme.ko as module (bsc#1150846)
- Disable CONFIG_DEBUG_PAGEALLOC (bsc#1159096).
- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).
- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).
- Drop an ASoC fix that was reverted in 4.14.y stable
- Drop multiversion(kernel) from the KMP template (bsc#1127155).
- EDAC/amd64: Adjust printed chip select sizes when interleaved (bsc#1131489).
- EDAC/amd64: Cache secondary Chip Select registers (bsc#1131489).
- EDAC/amd64: Decode syndrome before translating address (bsc#1114279).
- EDAC/amd64: Decode syndrome before translating address (bsc#1131489).
- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1131489).
- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1131489).
- EDAC/amd64: Recognize DRAM device type ECC capability (bsc#1131489).
- EDAC/amd64: Recognize x16 symbol size (bsc#1131489).
- EDAC/amd64: Set maximum channel layer size depending on family (bsc#1131489).
- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1131489).
- EDAC/amd64: Support more than two Unified Memory Controllers (bsc#1131489).
- EDAC/amd64: Support more than two controllers for chip selects handling (bsc#1131489).
- EDAC/amd64: Use a macro for iterating over Unified Memory Controllers (bsc#1131489).
- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).
- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).
- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).
- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).
- HID: Fix assumption that devices have inputs (git-fixes).
- HID: apple: Fix stuck function keys when using FN (bsc#1051510).
- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).
- HID: cp2112: prevent sleeping function called from invalid context (bsc#1051510).
- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).
- HID: fix error message in hid_open_report() (bsc#1051510).
- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).
- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).
- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).
- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).
- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).
- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).
- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).
- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)
- IB/core: Add mitigation for Spectre V1 (bsc#1155671)
- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).
- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).
- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).
- IB/mlx5: Fix steering rule of drop and count (bsc#1103991 ).
- IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).
- IB/mlx5: Remove dead code (bsc#1103991).
- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).
- IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991).
- Input: cyttsp4_core - fix use after free bug (bsc#1051510).
- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).
- Input: elan_i2c - remove Lenovo Legion Y7000 PnpID (bsc#1051510).
- Input: ff-memless - kill timer in destroy() (bsc#1051510).
- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).
- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).
- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).
- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).
- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).
- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).
- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).
- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).
- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).
- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).
- Input: synaptics-rmi4 - fix video buffer size (git-fixes).
- KABI protect struct vmem_altmap (bsc#1150305).
- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).
- KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores (bsc#1061840).
- KVM: PPC: Book3S HV: Do not lose pending doorbell request on migration on P9 (bsc#1061840).
- KVM: PPC: Book3S HV: Do not push XIVE context when not using XIVE device (bsc#1061840).
- KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest (bsc#1061840).
- KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts (bsc#1061840).
- KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code (bsc#1061840).
- KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP (bsc#1061840).
- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).
- KVM: PPC: Book3S: Fix incorrect guest-to-user-translation error handling (bsc#1061840).
- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).
- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).
- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).
- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).
- KVM: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).
- KVM: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).
- KVM: arm/arm64: Clean dcache to PoC when changing PTE due to CoW (jsc#ECO-561,jsc#SLE-10671).
- KVM: arm/arm64: Detangle kvm_mmu.h from kvm_hyp.h (jsc#ECO-561,jsc#SLE-10671).
- KVM: arm/arm64: Drop vcpu parameter from guest cache maintenance operartions (jsc#ECO-561,jsc#SLE-10671).
- KVM: arm/arm64: Limit icache invalidation to prefetch aborts (jsc#ECO-561,jsc#SLE-10671).
- KVM: arm/arm64: Only clean the dcache on translation fault (jsc#ECO-561,jsc#SLE-10671).
- KVM: arm/arm64: Preserve Exec permission across R/W permission faults (jsc#ECO-561,jsc#SLE-10671).
- KVM: arm/arm64: Split dcache/icache flushing (jsc#ECO-561,jsc#SLE-10671).
- KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (jsc#ECO-561).
- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).
- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).
- KVM: s390: fix __insn32_query() inline assembly (git-fixes).
- KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).
- KVM: s390: vsie: Return correct values for Invalid CRYCB format (git-fixes).
- KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).
- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).
- KVM: x86: Introduce vcpu->arch.xsaves_enabled (bsc#1158066).
- KVM: x86: Remove a spurious export of a static function (bsc#1158954).
- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).
- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).
- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).
- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).
- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).
- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).
- NFC: fix attrs checks in netlink interface (bsc#1051510).
- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).
- NFC: pn533: fix use-after-free and memleaks (bsc#1051510).
- NFC: st21nfca: fix double free (networking-stable-19_11_10).
- NFS: Do not interrupt file writeout due to fatal errors (git-fixes).
- NFS: Do not open code clearing of delegation state (git-fixes).
- NFS: Ensure O_DIRECT reports an error if the bytes read/written is 0 (git-fixes).
- NFS: Fix regression whereby fscache errors are appearing on 'nofsc' mounts (git-fixes).
- NFS: Forbid setting AF_INET6 to 'struct sockaddr_in'->sin_family (git-fixes).
- NFS: Refactor nfs_lookup_revalidate() (git-fixes).
- NFS: Remove redundant semicolon (git-fixes).
- NFS4: Fix v4.0 client state corruption when mount (git-fixes).
- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).
- NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter (git-fixes).
- NFSv4.1: Fix open stateid recovery (git-fixes).
- NFSv4.1: Only reap expired delegations (git-fixes).
- NFSv4/pnfs: Fix a page lock leak in nfs_pageio_resend() (git-fixes).
- NFSv4: Fix OPEN / CLOSE race (git-fixes).
- NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim() (git-fixes).
- NFSv4: Fix an Oops in nfs4_do_setattr (git-fixes).
- NFSv4: Fix delegation state recovery (git-fixes).
- NFSv4: Fix lookup revalidate of regular files (git-fixes).
- NFSv4: Handle the special Linux file open access mode (git-fixes).
- NFSv4: Only pass the delegation to setattr if we're sending a truncate (git-fixes).
- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).
- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).
- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).
- PCI/PM: Clear PCIe PME Status even for legacy power management (bsc#1111666).
- PCI/PME: Fix possible use-after-free on remove (git-fixes).
- PCI/PTM: Remove spurious 'd' from granularity message (bsc#1051510).
- PCI/VPD: Prevent VPD access for Amazon's Annapurna Labs Root Port (bsc#1152187,bsc#1152525).
- PCI: Add ACS quirk for Amazon Annapurna Labs root ports (bsc#1152187,bsc#1152525).
- PCI: Add Amazon's Annapurna Labs vendor ID (bsc#1152187,bsc#1152525).
- PCI: Add quirk to disable MSI-X support for Amazon's Annapurna Labs Root Port (bsc#1152187,bsc#1152525).
- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).
- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).
- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).
- PCI: PM: Fix pci_power_up() (bsc#1051510).
- PCI: al: Add Amazon Annapurna Labs PCIe host controller driver (SLE-9332).
- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).
- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).
- PCI: hv: Detect and fix Hyper-V PCI domain number collision (bsc#1150423).
- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).
- PCI: pciehp: Avoid returning prematurely from sysfs requests (git-fixes).
- PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).
- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).
- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).
- PCI: tegra: Enable Relaxed Ordering only for Tegra20 and Tegra30 (git-fixes).
- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).
- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).
- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).
- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).
- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).
- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).
- PM / devfreq: passive: fix compiler warning (bsc#1051510).
- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).
- PM: sleep: Fix possible overflow in pm_system_cancel_wakeup() (bsc#1051510).
- PNFS fallback to MDS if no deviceid found (git-fixes).
- RDMA/bnxt_re: Enable SRIOV VF support on Broadcom's 57500 adapter series (bsc#1154916).
- RDMA/bnxt_re: Fix chip number validation Broadcom's Gen P5 series (bsc#1157895).
- RDMA/bnxt_re: Fix missing le16_to_cpu (bsc#1157895).
- RDMA/bnxt_re: Fix spelling mistake 'missin_resp' -> 'missing_resp' (bsc#1050244).
- RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (bsc#1157115)
- RDMA/efa: Add Amazon EFA driver (jsc#SLE-4805)
- RDMA/efa: Clear the admin command buffer prior to its submission (git-fixes) Patch was already picked through Amazon driver repo but was not marked with a Git-commit tag
- RDMA/hns: Add mtr support for mixed multihop addressing (bsc#1104427).
- RDMA/hns: Add reset process for function-clear (bsc#1155061).
- RDMA/hns: Bugfix for calculating qp buffer size (bsc#1104427 ).
- RDMA/hns: Bugfix for filling the sge of srq (bsc#1104427 ).
- RDMA/hns: Bugfix for qpc/cqc timer configuration (bsc#1104427 bsc#1126206).
- RDMA/hns: Correct the value of srq_desc_size (bsc#1104427 ).
- RDMA/hns: Fix an error code in hns_roce_set_user_sq_size() (bsc#1104427).
- RDMA/hns: Fix comparison of unsigned long variable 'end' with less than zero (bsc#1104427 bsc#1137236).
- RDMA/hns: Fix to support 64K page for srq (bsc#1104427 ).
- RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).
- RDMA/hns: Fixs hw access invalid dma memory error (bsc#1104427 ).
- RDMA/hns: Fixup qp release bug (bsc#1104427).
- RDMA/hns: Modify ba page size for cqe (bsc#1104427).
- RDMA/hns: Prevent memory leaks of eq->buf_list (bsc#1104427 ).
- RDMA/hns: Remove set but not used variable 'fclr_write_fail_flag' (bsc#1104427).
- RDMA/hns: Remove the some magic number (bsc#1155061).
- RDMA/hns: Remove unnecessary print message in aeq (bsc#1104427 ).
- RDMA/hns: Replace magic numbers with #defines (bsc#1104427 ).
- RDMA/hns: Set reset flag when hw resetting (bsc#1104427 ).
- RDMA/hns: Use %pK format pointer print (bsc#1104427 ).
- RDMA/hns: fix inverted logic of readl read and shift (bsc#1104427).
- RDMA/hns: reset function when removing module (bsc#1104427 ).
- RDMA/restrack: Track driver QP types in resource tracker (jsc#SLE-4805)
- RDMA: Fix goto target to release the allocated memory (bsc#1050244).
- RDMa/hns: Do not stuck in endless timeout loop (bsc#1104427 ).
- README.BRANCH: Add Denis as branch maintainer
- README.BRANCH: Removing myself from the maintainer list
- README.BRANCH: Removing myself from the maintainer list.
- README.BRANCH: removing myself from the maintainer list
- Revert 'mmc: sdhci: Fix incorrect switch to HS mode' (bsc#1051510).
- SUNRPC fix regression in umount of a secure mount (git-fixes).
- SUNRPC/nfs: Fix return value for nfs4_callback_compound() (git-fixes).
- SUNRPC: Handle connection breakages correctly in call_status() (git-fixes).
- UAS: Revert commit 3ae62a42090f ('UAS: fix alignment of scatter/gather segments').
- USB: Allow USB device to be warm reset in suspended state (bsc#1051510).
- USB: adutux: fix NULL-derefs on disconnect (bsc#1142635).
- USB: adutux: fix interface sanity check (bsc#1051510).
- USB: adutux: fix use-after-free on disconnect (bsc#1142635).
- USB: adutux: fix use-after-free on release (bsc#1051510).
- USB: chaoskey: fix error case of a timeout (git-fixes).
- USB: chaoskey: fix use-after-free on release (bsc#1051510).
- USB: core: urb: fix URB structure initialization function (bsc#1051510).
- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).
- USB: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).
- USB: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).
- USB: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).
- USB: dwc3: ep0: Clear started flag on completion (bsc#1051510).
- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).
- USB: gadget: pch_udc: fix use after free (bsc#1051510).
- USB: gadget: u_serial: add missing port entry locking (bsc#1051510).
- USB: idmouse: fix interface sanity checks (bsc#1051510).
- USB: iowarrior: fix use-after-free after driver unbind (bsc#1051510).
- USB: iowarrior: fix use-after-free on disconnect (bsc#1051510).
- USB: iowarrior: fix use-after-free on release (bsc#1051510).
- USB: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).
- USB: ldusb: fix control-message timeout (bsc#1051510).
- USB: ldusb: fix memleak on disconnect (bsc#1051510).
- USB: ldusb: fix read info leaks (bsc#1051510).
- USB: ldusb: fix ring-buffer locking (bsc#1051510).
- USB: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).
- USB: legousbtower: fix deadlock on disconnect (bsc#1142635).
- USB: legousbtower: fix memleak on disconnect (bsc#1051510).
- USB: legousbtower: fix open after failed reset request (bsc#1142635).
- USB: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).
- USB: legousbtower: fix slab info leak at probe (bsc#1142635).
- USB: legousbtower: fix use-after-free on release (bsc#1051510).
- USB: microtek: fix info-leak at probe (bsc#1142635).
- USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).
- USB: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).
- USB: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).
- USB: serial: fix runtime PM after driver unbind (bsc#1051510).
- USB: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).
- USB: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).
- USB: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).
- USB: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).
- USB: serial: mos7720: fix remote wakeup (git-fixes).
- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).
- USB: serial: mos7840: fix remote wakeup (git-fixes).
- USB: serial: option: add Telit FN980 compositions (bsc#1051510).
- USB: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).
- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).
- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).
- USB: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).
- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).
- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).
- USB: storage: ums-realtek: Update module parameter description for auto_delink_en (bsc#1051510).
- USB: storage: ums-realtek: Whitelist auto-delink support (bsc#1051510).
- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).
- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).
- USB: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).
- USB: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).
- USB: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).
- USB: usbcore: Fix slab-out-of-bounds bug during device reset (bsc#1051510).
- USB: usblcd: fix I/O after disconnect (bsc#1142635).
- USB: usblp: fix runtime PM after driver unbind (bsc#1051510).
- USB: usblp: fix use-after-free on disconnect (bsc#1051510).
- USB: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).
- USB: xhci: only set D3hot for pci device (bsc#1051510).
- USB: yurex: Do not retry on unexpected errors (bsc#1051510).
- USB: yurex: fix NULL-derefs on disconnect (bsc#1051510).
- USBIP: add config dependency for SGL_ALLOC (git-fixes).
- acpi/nfit, device-dax: Identify differentiated memory with a unique numa-node (bsc#1158071).
- act_mirred: Fix mirred_init_module error handling (bsc#1051510).
- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).
- apparmor: fix unsigned len comparison with less than zero (git-fixes).
- appledisplay: fix error handling in the scheduled work (git-fixes).
- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).
- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).
- arm64/cpufeature: Convert hook_lock to raw_spin_lock_t in cpu_enable_ssbs() (jsc#ECO-561).
- arm64: Add decoding macros for CP15_32 and CP15_64 traps (jsc#ECO-561).
- arm64: Add part number for Neoverse N1 (jsc#ECO-561).
- arm64: Add silicon-errata.txt entry for ARM erratum 1188873 (jsc#ECO-561).
- arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1 (jsc#ECO-561).
- arm64: Fake the IminLine size on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).
- arm64: Fix mismatched cache line size detection (jsc#ECO-561,jsc#SLE-10671).
- arm64: Fix silly typo in comment (jsc#ECO-561).
- arm64: Force SSBS on context switch (jsc#ECO-561).
- arm64: Handle erratum 1418040 as a superset of erratum 1188873 (jsc#ECO-561).
- arm64: Introduce sysreg_clear_set() (jsc#ECO-561).
- arm64: KVM: Add invalidate_icache_range helper (jsc#ECO-561,jsc#SLE-10671).
- arm64: KVM: PTE/PMD S2 XN bit definition (jsc#ECO-561,jsc#SLE-10671).
- arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT (jsc#ECO-561).
- arm64: PCI: Preserve firmware configuration when desired (SLE-9332).
- arm64: Restrict ARM64_ERRATUM_1188873 mitigation to AArch32 (jsc#ECO-561).
- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.
- arm64: arch_timer: Add workaround for ARM erratum 1188873 (jsc#ECO-561).
- arm64: arch_timer: avoid unused function warning (jsc#ECO-561).
- arm64: compat: Add CNTFRQ trap handler (jsc#ECO-561).
- arm64: compat: Add CNTVCT trap handler (jsc#ECO-561).
- arm64: compat: Add condition code checks and IT advance (jsc#ECO-561).
- arm64: compat: Add cp15_32 and cp15_64 handler arrays (jsc#ECO-561).
- arm64: compat: Add separate CP15 trapping hook (jsc#ECO-561).
- arm64: compat: Workaround Neoverse-N1 #1542419 for compat user-space (jsc#ECO-561,jsc#SLE-10671).
- arm64: cpu: Move errata and feature enable callbacks closer to callers (jsc#ECO-561).
- arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZE (jsc#ECO-561,jsc#SLE-10671).
- arm64: cpufeature: Detect SSBS and advertise to userspace (jsc#ECO-561).
- arm64: cpufeature: Fix handling of CTR_EL0.IDC field (jsc#ECO-561,jsc#SLE-10671).
- arm64: cpufeature: Trap CTR_EL0 access only where it is necessary (jsc#ECO-561,jsc#SLE-10671).
- arm64: cpufeature: ctr: Fix cpu capability check for late CPUs (jsc#ECO-561,jsc#SLE-10671).
- arm64: entry: Allow handling of undefined instructions from EL1 (jsc#ECO-561).
- arm64: errata: Hide CTR_EL0.DIC on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).
- arm64: fix SSBS sanitization (jsc#ECO-561).
- arm64: force_signal_inject: WARN if called from kernel context (jsc#ECO-561).
- arm64: kill change_cpacr() (jsc#ECO-561).
- arm64: kill config_sctlr_el1() (jsc#ECO-561).
- arm64: move SCTLR_EL{1,2} assertions to asm/sysreg.h (jsc#ECO-561).
- arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3 (jsc#ECO-561).
- arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (jsc#ECO-561).
- arm: KVM: Add optimized PIPT icache flushing (jsc#ECO-561,jsc#SLE-10671).
- ata: ep93xx: Use proper enums for directions (bsc#1051510).
- ath10k: Correct error handling of dma_map_single() (bsc#1111666).
- ath10k: adjust skb length in ath10k_sdio_mbox_rx_packet (bsc#1111666).
- ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem (bsc#1111666).
- ath10k: assign 'n_cipher_suites = 11' for WCN3990 to enable WPA3 (bsc#1111666).
- ath10k: avoid possible memory access violation (bsc#1111666).
- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).
- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).
- ath10k: fix vdev-start timeout on error (bsc#1051510).
- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).
- ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).
- ath10k: wmi: disable softirq's while calling ieee80211_rx (bsc#1051510).
- ath6kl: Fix off by one error in scan completion (bsc#1051510).
- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).
- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).
- ath9k: dynack: fix possible deadlock in ath_dynack_node_{de}init (bsc#1051510).
- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).
- ath9k: fix tx99 with monitor mode interface (bsc#1051510).
- ath9k_hw: fix uninitialized variable data (bsc#1051510).
- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).
- atm: iphase: Fix Spectre v1 vulnerability (networking-stable-19_08_08).
- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).
- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).
- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ax88172a: fix information leak on short answers (bsc#1051510).
- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).
- bcma: fix incorrect update of BCMA_CORE_PCI_MDIO_DATA (bsc#1051510).
- blk-flush: do not run queue for requests bypassing flush (bsc#1137959).
- blk-flush: use blk_mq_request_bypass_insert() (bsc#1137959).
- blk-mq-sched: decide how to handle flush rq via RQF_FLUSH_SEQ (bsc#1137959).
- blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling (bsc#1151610).
- blk-mq: backport fixes for blk_mq_complete_e_request_sync() (bsc#1145661).
- blk-mq: do not allocate driver tag upfront for flush rq (bsc#1137959).
- blk-mq: insert rq with DONTPREP to hctx dispatch list when requeue (bsc#1137959).
- blk-mq: introduce blk_mq_complete_request_sync() (bsc#1145661).
- blk-mq: introduce blk_mq_request_completed() (bsc#1149446).
- blk-mq: introduce blk_mq_tagset_wait_completed_request() (bsc#1149446).
- blk-mq: kABI fixes for blk-mq.h (bsc#1137959).
- blk-mq: move blk_mq_put_driver_tag*() into blk-mq.h (bsc#1137959).
- blk-mq: punt failed direct issue to dispatch list (bsc#1137959).
- blk-mq: put the driver tag of nxt rq before first one is requeued (bsc#1137959).
- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (bsc#1141543).
- blk-wbt: abstract out end IO completion handler (bsc#1135873).
- blk-wbt: fix has-sleeper queueing check (bsc#1135873).
- blk-wbt: improve waking of tasks (bsc#1135873).
- blk-wbt: move disable check into get_limit() (bsc#1135873).
- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).
- block: add io timeout to sysfs (bsc#1148410).
- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).
- block: fix timeout changes for legacy request drivers (bsc#1149446).
- block: kABI fixes for BLK_EH_DONE renaming (bsc#1142076).
- block: rename BLK_EH_NOT_HANDLED to BLK_EH_DONE (bsc#1142076).
- bnx2x: Disable multi-cos feature (networking-stable-19_08_08).
- bnx2x: Fix VF's VLAN reconfiguration in reload (bsc#1086323 ).
- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).
- bnxt_en: Fix VNIC clearing logic for 57500 chips (bsc#1104745 ).
- bnxt_en: Fix to include flow direction in L2 key (bsc#1104745 ).
- bnxt_en: Improve RX doorbell sequence (bsc#1104745).
- bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).
- bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)
- bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)
- bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)
- bnxt_en: Use correct src_fid to determine direction of the flow (bsc#1104745).
- bonding/802.3ad: fix link_failure_count tracking (bsc#1137069 bsc#1141013).
- bonding/802.3ad: fix slave link initialization transition states (bsc#1137069 bsc#1141013).
- bonding: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).
- bonding: fix active-backup transition after link failure (git-fixes).
- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).
- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).
- bonding: set default miimon value for non-arp modes if not set (bsc#1137069 bsc#1141013).
- bonding: speed/duplex update at NETDEV_UP event (bsc#1137069 bsc#1141013).
- bpf, offload: Unlock on error in bpf_offload_dev_create() (bsc#1109837).
- bpf/stackmap: Fix deadlock with rq_lock in bpf_get_stack() (bsc#1083647).
- bpf: Fix use after free in subprog's jited symbol removal (bsc#1109837).
- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).
- bpf: fix BTF limits (bsc#1109837).
- bpf: fix BTF verification of enums (bsc#1109837).
- bpf: fix use after free in prog symbol exposure (bsc#1083647).
- bpf: skmsg, fix potential psock NULL pointer dereference (bsc#1109837).
- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).
- brcmfmac: fix wrong strnchr usage (bsc#1111666).
- brcmfmac: increase buffer for obtaining firmware capabilities (bsc#1111666).
- brcmfmac: reduce timeout for action frame scan (bsc#1051510).
- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).
- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).
- brcmfmac: set F2 watermark to 256 for 4373 (bsc#1111666).
- brcmfmac: set SDIO F1 MesBusyCtrl for CYW4373 (bsc#1111666).
- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).
- brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).
- brcmsmac: never log 'tid x is not agg'able' by default (bsc#1051510).
- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).
- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).
- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).
- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).
- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).
- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).
- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).
- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).
- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).
- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1152972).
- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).
- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).
- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).
- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).
- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).
- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).
- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).
- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).
- can: mcba_usb: fix use-after-free on disconnect (git-fixes).
- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).
- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).
- can: peak_usb: fix slab info leak (git-fixes).
- can: peak_usb: report bus recovery as well (bsc#1051510).
- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).
- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).
- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).
- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).
- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).
- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).
- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).
- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).
- can: usb_8dev: fix use-after-free on disconnect (git-fixes).
- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).
- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).
- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).
- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).
- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).
- ceph: fix directories inode i_blkbits initialization (bsc#1153717).
- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).
- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).
- ceph: reconnect connection if session hang in opening state (bsc#1153718).
- ceph: update the mtime when truncating up (bsc#1153719).
- ceph: use ceph_evict_inode to cleanup inode's resource (bsc#1148133).
- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).
- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).
- cfg80211: Purge frame registrations on iftype change (bsc#1051510).
- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).
- cfg80211: call disconnect_wk when AP stops (bsc#1051510).
- cfg80211: validate wmm rule when setting (bsc#1111666).
- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).
- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).
- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).
- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).
- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).
- cifs: handle netapp error codes (bsc#1136261).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).
- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).
- cifs: use cifsInodeInfo->open_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).
- clk: at91: avoid sleeping early (git-fixes).
- clk: at91: fix update bit maps on CFG_MOR write (bsc#1051510).
- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).
- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).
- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).
- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).
- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).
- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).
- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).
- clk: sunxi-ng: a80: fix the zero'ing of bits 16 and 18 (git-fixes).
- clk: sunxi-ng: v3s: add missing clock slices for MMC2 module clocks (bsc#1051510).
- clk: sunxi-ng: v3s: add the missing PLL_DDR1 (bsc#1051510).
- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).
- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).
- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).
- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).
- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).
- config: arm64: enable erratum 1418040 and 1542419
- configfs_register_group() shouldn't be (and isn't) called in rmdirable parts (bsc#1051510).
- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).
- cpufreq: Skip cpufreq resume if it's not suspended (bsc#1051510).
- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).
- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).
- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).
- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).
- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).
- cpupower: Fix coredump on VMWare (bsc#1051510).
- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).
- crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t (bsc#1154737).
- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).
- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).
- crypto: af_alg - consolidation of duplicate code (bsc#1154737).
- crypto: af_alg - fix race accessing cipher request (bsc#1154737).
- crypto: af_alg - remove locking in async callback (bsc#1154737).
- crypto: af_alg - update correct dst SGL entry (bsc#1051510).
- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).
- crypto: algif - return error code when no data was processed (bsc#1154737).
- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).
- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).
- crypto: algif_aead - overhaul memory management (bsc#1154737).
- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).
- crypto: algif_skcipher - overhaul memory management (bsc#1154737).
- crypto: caam - fix concurrency issue in givencrypt descriptor (bsc#1051510).
- crypto: caam - free resources in case caam_rng registration failed (bsc#1051510).
- crypto: caam/qi - fix error handling in ERN handler (bsc#1111666).
- crypto: cavium/zip - Add missing single_release() (bsc#1051510).
- crypto: ccp - Reduce maximum stack usage (bsc#1051510).
- crypto: ccp - fix uninitialized list head (bsc#1051510).
- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).
- crypto: dh - add public key verification test (bsc#1155331).
- crypto: dh - fix calculating encoded key size (bsc#1155331).
- crypto: dh - fix memory leak (bsc#1155331).
- crypto: dh - update test for public key verification (bsc#1155331).
- crypto: ecdh - add public key verification test (bsc#1155331).
- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).
- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).
- crypto: fix a memory leak in rsa-kcs1pad's encryption mode (bsc#1051510).
- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).
- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).
- crypto: mxs-dcp - Fix AES issues (bsc#1051510).
- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).
- crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static (bsc#1051510).
- crypto: qat - Silence smp_processor_id() warning (bsc#1051510).
- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).
- crypto: skcipher - Unmap pages after an external error (bsc#1051510).
- crypto: talitos - fix missing break in switch statement (bsc#1142635).
- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).
- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).
- cx82310_eth: fix a memory leak bug (bsc#1051510).
- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: do not dma memory off of the stack (bsc#1152790).
- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).
- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).
- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).
- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).
- cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#1127371).
- cxgb4: request the TX CIDX updates to status page (bsc#1127371).
- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).
- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).
- dasd_fba: Display '00000000' for zero page when dumping sense (bsc#1123080).
- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).
- dlm: do not leak kernel pointer to userspace (bsc#1051510).
- dlm: fix invalid free (bsc#1051510).
- dma-buf/sw_sync: Synchronize signal vs syncpt free (bsc#1111666).
- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).
- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).
- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).
- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).
- dmaengine: dw: platform: Switch to acpi_dma_controller_register() (bsc#1051510).
- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).
- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).
- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).
- dmaengine: iop-adma.c: fix printk format warning (bsc#1051510).
- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).
- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).
- docs: move protection-keys.rst to the core-api book (bsc#1078248).
- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).
- drivers/regulator: fix a missing check of return value (bsc#1051510).
- drivers: thermal: int340x_thermal: Fix sysfs race condition (bsc#1051510).
- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)
- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).
- drm/amd/display: fix odm combine pipe reset (bsc#1111666).
- drm/amd/display: reprogram VM config when system resume (bsc#1111666).
- drm/amd/display: support spdif (bsc#1111666).
- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).
- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).
- drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported (bsc#1113956)
- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).
- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).
- drm/amdgpu/powerplay/vega10: allow undervolting in p7 (bsc#1111666).
- drm/amdgpu/si: fix ASIC tests (git-fixes).
- drm/amdgpu: Add APTX quirk for Dell Latitude 5495 (bsc#1142635)
- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).
- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).
- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).
- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).
- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)
- drm/amdgpu: fix memory leak (bsc#1111666).
- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).
- drm/amdkfd: fix a use after free race with mmu_notifer unregister (bsc#1154048)
- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).
- drm/atomic_helper: Allow DPMS On/Off changes for unregistered connectors (bsc#1111666).
- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).
- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).
- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).
- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).
- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).
- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)
- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)
- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)
- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)
- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)
- drm/i915/cml: Add second PCH ID for CMP (bsc#1111666).
- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)
- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)
- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)
- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)
- drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).
- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)
- drm/i915/ilk: Fix warning when reading emon_status with no output (bsc#1111666).
- drm/i915/pmu: 'Frequency' is reported as accumulated cycles (bsc#1112178)
- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)
- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)
- drm/i915: Allow parsing of unsized batches (bsc#1135967)
- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).
- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)
- drm/i915: Do not deballoon unused ggtt drm_mm_node in linux guest (bsc#1142635)
- drm/i915: Do not dereference request if it may have been retired when (bsc#1142635)
- drm/i915: Fix and improve MCR selection logic (bsc#1112178)
- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).
- drm/i915: Fix various tracepoints for gen2 (bsc#1113722)
- drm/i915: Lock the engine while dumping the active request (bsc#1142635)
- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)
- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)
- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770)
- drm/i915: Remove Master tables from cmdparser (bsc#1135967)
- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)
- drm/i915: Restore relaxed padding (OCL_OOB_SUPPRES_ENABLE) for skl+ (bsc#1142635)
- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).
- drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).
- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)
- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)
- drm/imx: Drop unused imx-ipuv3-crtc.o build (bsc#1113722)
- drm/mediatek: set DMA max segment size (bsc#1111666).
- drm/msm/dpu: handle failures while initializing displays (bsc#1111666).
- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).
- drm/msm/dsi: Implement reset correctly (bsc#1051510).
- drm/msm/dsi: Implement reset correctly (bsc#1154048)
- drm/msm: fix memleak on release (bsc#1111666).
- drm/msm: include linux/sched/task.h (bsc#1112178)
- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).
- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)
- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).
- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).
- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)
- drm/panel: check failure cases in the probe func (bsc#1111666).
- drm/panel: make drm_panel.h self-contained (bsc#1111666).
- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).
- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).
- drm/radeon: Fix EEH during kexec (bsc#1051510).
- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).
- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)
- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).
- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)
- drm/stm: attach gem fence to atomic state (bsc#1111666).
- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).
- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).
- drm: Flush output polling on shutdown (bsc#1051510).
- drm: add __user attribute to ptr_to_compat() (bsc#1111666).
- drm: fix module name in edid_firmware log message (bsc#1113956)
- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).
- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)
- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).
- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).
- e1000e: Add support for Comet Lake (bsc#1158533).
- e1000e: Add support for Tiger Lake (bsc#1158533).
- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).
- e1000e: Increase pause and refresh time (bsc#1158533).
- e1000e: Use dev_get_drvdata where possible (bsc#1158049).
- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).
- e1000e: add workaround for possible stalled packet (bsc#1051510).
- e100: Fix passing zero to 'PTR_ERR' warning in e100_load_ucode_wait (bsc#1051510).
- ecryptfs_lookup_interpose(): lower_dentry->d_inode is not stable (bsc#1158646).
- ecryptfs_lookup_interpose(): lower_dentry->d_parent is not stable either (bsc#1158647).
- eeprom: at24: make spd world-readable again (git-fixes).
- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).
- efi/memattr: Do not bail on zero VA if it equals the region's PA (bsc#1051510).
- efi: cper: print AER info of PCIe fatal error (bsc#1051510).
- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).
- ext4: fix punch hole for inline_data file systems (bsc#1158640).
- ext4: fix warning inside ext4_convert_unwritten_extents_endio (bsc#1152025).
- ext4: set error return correctly when ext4_htree_store_dirent fails (bsc#1152024).
- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).
- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).
- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).
- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).
- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).
- fix SCTP regression (bsc#1158082)
- floppy: fix usercopy direction (bsc#1111666).
- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).
- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).
- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).
- gpio: Move gpiochip_lock/unlock_as_irq to gpio/driver.h (bsc#1051510).
- gpio: fix line flag validation in lineevent_create (bsc#1051510).
- gpio: fix line flag validation in linehandle_create (bsc#1051510).
- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).
- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).
- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).
- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and blacklist (bsc#1051510).
- gpiolib: only check line handle flags once (bsc#1051510).
- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).
- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).
- hso: fix NULL-deref on tty open (bsc#1051510).
- hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap' (bsc#1051510).
- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).
- hwmon: (lm75) Fix write operations for negative temperatures (bsc#1051510).
- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).
- hwmon: (shtc1) fix shtc1 and shtw1 id mask (bsc#1051510).
- hwrng: core - do not wait on add_early_randomness() (git-fixes).
- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).
- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).
- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).
- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).
- hypfs: Fix error number left in struct pointer member (bsc#1051510).
- i2c: designware: Synchronize IRQs when unregistering slave client (bsc#1111666).
- i2c: emev2: avoid race when unregistering slave client (bsc#1051510).
- i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)
- i2c: piix4: Fix port selection for AMD Family 16h Model 30h (bsc#1051510).
- i2c: riic: Clear NACK in tend isr (bsc#1051510).
- i40e: Add support for X710 device (bsc#1151067).
- i40e: enable X710 support (bsc#1151067).
- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).
- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).
- ice: fix potential infinite loop because loop counter being too small (bsc#1118661).
- ice: fix stack leakage (bsc#1118661).
- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).
- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).
- ieee802154: ca8210: prevent memory leak (bsc#1051510).
- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- ife: error out when nla attributes are empty (networking-stable-19_08_08).
- iio: adc: ad799x: fix probe error handling (bsc#1051510).
- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).
- iio: adc: stm32-adc: fix stopping dma (git-fixes).
- iio: dac: ad5380: fix incorrect assignment to val (bsc#1051510).
- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).
- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).
- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).
- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).
- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).
- iio: light: opt3001: fix mutex unlock race (bsc#1051510).
- ima: always return negative code for error (bsc#1051510).
- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).
- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).
- integrity: prevent deadlock during digsig verification (bsc#1090631).
- intel_th: Fix a double put_device() in error path (git-fixes).
- intel_th: pci: Add Tiger Lake support (bsc#1051510).
- intel_th: pci: Add support for another Lewisburg PCH (bsc#1051510).
- iomap: Fix pipe page leakage during splicing (bsc#1158651).
- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).
- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).
- iommu/amd: Fix race in increase_address_space() (bsc#1150860).
- iommu/amd: Flush old domains in kdump kernel (bsc#1150861).
- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).
- iommu/amd: Remove domain->updated (bsc#1154610).
- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).
- iommu/dma: Fix for dereferencing before null checking (bsc#1151667).
- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151662).
- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151671).
- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).
- iommu: Do not use sme_active() in generic code (bsc#1151661).
- ip6_tunnel: fix possible use-after-free on xmit (networking-stable-19_08_08).
- ipmi: Do not allow device module unload when in use (bsc#1154768).
- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).
- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).
- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).
- ipv4: Return -ENETUNREACH if we can't create route but saddr is valid (networking-stable-19_10_24).
- ipv6/addrconf: allow adding multicast addr if IFA_F_MCAUTOJOIN is set (networking-stable-19_08_28).
- ipv6: Fix the link time qualifier of 'ping_v6_proc_exit_net()' (networking-stable-19_09_15).
- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).
- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).
- irqchip/gic-v2m: Add support for Amazon Graviton variant of GICv3+GICv2m (SLE-9332).
- irqchip/gic-v3-its: Fix LPI release for Multi-MSI devices (jsc#ECO-561).
- irqchip/gic-v3-its: Fix command queue pointer comparison bug (jsc#ECO-561).
- irqchip/gic-v3-its: Fix misuse of GENMASK macro (jsc#ECO-561).
- irqdomain: Add the missing assignment of domain->fwnode for named fwnode (bsc#1111666).
- isdn/capi: check message length in capi_write() (bsc#1051510).
- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).
- iwlwifi: check kasprintf() return value (bsc#1051510).
- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).
- iwlwifi: drop packets with bad status in CD (bsc#1111666).
- iwlwifi: exclude GEO SAR support for 3168 (bsc#1111666).
- iwlwifi: fix bad dma handling in page_mem dumping flow (bsc#1120902).
- iwlwifi: fw: do not send GEO_TX_POWER_LIMIT command to FW version 36 (bsc#1111666).
- iwlwifi: fw: use helper to determine whether to dump paging (bsc#1106434). Patch needed to be adjusted, because our tree does not have the global variable IWL_FW_ERROR_DUMP_PAGING
- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).
- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).
- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).
- iwlwifi: mvm: force TCM re-evaluation on TCM resume (bsc#1111666).
- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).
- iwlwifi: mvm: use correct FIFO length (bsc#1111666).
- iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).
- iwlwifi: pcie: fix erroneous print (bsc#1111666).
- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).
- iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).
- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).
- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).
- ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).
- ixgbe: fix possible deadlock in ixgbe_service_task() (bsc#1113994).
- ixgbe: sync the first fragment unconditionally (bsc#1133140).
- ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).
- kABI fix for 'ipmi: Do not allow device module unload when in use' (bsc#1154768).
- kABI fixup alloc_dax_region (bsc#1158071).
- kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).
- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).
- kABI workaround for crypto/af_alg changes (bsc#1154737).
- kABI workaround for drm_connector.registered type changes (bsc#1111666).
- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)
- kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).
- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).
- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).
- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).
- kABI: Fix for 'KVM: x86: Introduce vcpu->arch.xsaves_enabled' (bsc#1158066).
- kABI: add _q suffix to exports that take struct dh (bsc#1155331).
- kABI: media: em28xx: fix handler for vidioc_s_input() (bsc#1051510). fixes kABI
- kABI: media: em28xx: stop rewriting device's struct (bsc#1051510). fixes kABI
- kabi protect enum RDMA_DRIVER_EFA (jsc#SLE-4805)
- kabi/severities: Whitelist a couple of xive functions xive_cleanup_irq_data and xive_native_populate_irq_data are exported by the xive interupt controller driver and used by KVM. I do not expect any out-of-tree driver can sanely use these.
- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can't be expected of OOT code.
- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- kabi: s390: struct subchannel (git-fixes).
- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).
- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354).
- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).
- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).
- kexec: bail out upon SIGKILL when allocating memory (git-fixes).
- keys: Fix missing null pointer check in request_key_auth_describe() (bsc#1051510).
- ksm: cleanup stable_node chain collapse case (bnc#1144338).
- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).
- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).
- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).
- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).
- kvm: Convert kvm_lock to a mutex (bsc#1117665).
- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).
- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).
- lan78xx: Fix memory leaks (bsc#1051510).
- leds: leds-lp5562 allow firmware files up to the maximum length (bsc#1051510).
- leds: trigger: gpio: GPIO 0 is valid (bsc#1051510).
- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).
- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).
- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).
- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).
- libertas_tf: Use correct channel range in lbtf_geo_init (bsc#1051510).
- libiscsi: do not try to bypass SCSI EH (bsc#1142076).
- libnvdimm/altmap: Track namespace boundaries in altmap (bsc#1150305).
- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).
- libnvdimm: Export the target_node attribute for regions and namespaces (bsc#1158071).
- libnvdimm: prevent nvdimm from requesting key when security is disabled (bsc#1137982).
- lightnvm: remove dependencies on BLK_DEV_NVME and PCI (bsc#1150846).
- liquidio: add cleanup in octeon_setup_iq() (bsc#1051510).
- liquidio: fix race condition in instruction completion processing (bsc#1051510).
- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).
- livepatch: Basic API to track system state changes (bsc#1071995 ).
- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).
- livepatch: Nullify obj->mod in klp_module_coming()'s error path (bsc#1071995).
- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).
- loop: add ioctl for changing logical block size (bsc#1108043).
- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).
- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).
- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).
- lpfc: Add additional discovery log messages (bsc#1154521).
- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).
- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).
- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).
- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).
- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).
- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).
- lpfc: Make FW logging dynamically configurable (bsc#1154521).
- lpfc: Remove lock contention target write path (bsc#1154521).
- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).
- lpfc: Slight fast-path Performance optimizations (bsc#1154521).
- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).
- lpfc: fix coverity error of dereference after null check (bsc#1154521).
- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).
- lpfc: size cpu map by last cpu id set (bsc#1157160).
- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).
- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).
- mac80211: Reject malformed SSID elements (bsc#1051510).
- mac80211: accept deauth frames in IBSS mode (bsc#1051510).
- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).
- mac80211: fix station inactive_time shortly after boot (bsc#1051510).
- mac80211: fix txq null pointer dereference (bsc#1051510).
- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).
- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).
- mac80211: minstrel_ht: fix per-group max throughput rate initialization (bsc#1051510).
- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).
- macvlan: schedule bc_work even if error (bsc#1051510).
- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).
- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).
- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).
- md/raid0: fix warning message for parameter default_layout (bsc#1140090).
- md/raid6: Set R5_ReadError when there is read failure on parity disk (git-fixes).
- md: do not report active array_state until after revalidate_disk() completes (git-fixes).
- md: only call set_in_sync() when it is expected to succeed (git-fixes).
- media: Revert '[media] marvell-ccic: reset ccic phy when stop streaming for stability' (bsc#1051510).
- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).
- media: atmel: atmel-isi: fix timeout value for stop streaming (bsc#1051510).
- media: au0828: Fix incorrect error messages (bsc#1051510).
- media: bdisp: fix memleak on release (git-fixes).
- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).
- media: cec: report Vendor ID after initialization (bsc#1051510).
- media: cpia2_usb: fix memory leaks (bsc#1051510).
- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).
- media: davinci: Fix implicit enum conversion warning (bsc#1051510).
- media: dib0700: fix link error for dibx000_i2c_set_speed (bsc#1051510).
- media: dvb-core: fix a memory leak bug (bsc#1051510).
- media: em28xx: fix handler for vidioc_s_input() (bsc#1051510).
- media: em28xx: stop rewriting device's struct (bsc#1051510).
- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).
- media: exynos4-is: fix leaked of_node references (bsc#1051510).
- media: fdp1: Reduce FCP not found message level to debug (bsc#1051510).
- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).
- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).
- media: gspca: zero usb_buf on error (bsc#1051510).
- media: hdpvr: Add device num check and handling (bsc#1051510).
- media: hdpvr: add terminating 0 at end of string (bsc#1051510).
- media: i2c: ov5645: Fix power sequence (bsc#1051510).
- media: iguanair: add sanity checks (bsc#1051510).
- media: imon: invalid dereference in imon_touch_event (bsc#1051510).
- media: isif: fix a NULL pointer dereference bug (bsc#1051510).
- media: marvell-ccic: do not generate EOF on parallel bus (bsc#1051510).
- media: mc-device.c: do not memset __user pointer contents (bsc#1051510).
- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).
- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).
- media: ov6650: Fix control handler not freed on init error (git-fixes).
- media: ov6650: Fix sensor possibly not detected on probe (bsc#1051510).
- media: ov6650: Move v4l2_clk_get() to ov6650_video_probe() helper (bsc#1051510).
- media: ov9650: add a sanity check (bsc#1051510).
- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).
- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).
- media: pxa_camera: Fix check for pdev->dev.of_node (bsc#1051510).
- media: radio/si470x: kill urb on error (bsc#1051510).
- media: radio: wl1273: fix interrupt masking on release (git-fixes).
- media: replace strcpy() by strscpy() (bsc#1051510).
- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).
- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).
- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).
- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).
- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).
- media: technisat-usb2: break out of loop at end of buffer (bsc#1051510).
- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).
- media: tm6000: double free if usb disconnect while streaming (bsc#1051510).
- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).
- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).
- media: uvcvideo: Fix error path in control parsing failure (git-fixes).
- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).
- media: vb2: Fix videobuf2 to map correct area (bsc#1051510).
- media: vim2m: Fix abort issue (git-fixes).
- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).
- mei: bus: prefix device names on bus with the bus name (bsc#1051510).
- mei: fix modalias documentation (git-fixes).
- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).
- memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()' (bsc#1051510).
- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).
- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).
- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).
- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).
- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).
- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).
- mic: avoid statically declaring a 'struct device' (bsc#1051510).
- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).
- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)
- mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions (bsc#1112374).
- mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel (bsc#1112374).
- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).
- mm, page_owner, debug_pagealloc: save and dump freeing stack trace (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).
- mm, page_owner: decouple freeing stack trace from debug_pagealloc (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).
- mm, page_owner: fix off-by-one error in __set_page_owner_handle() (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).
- mm, page_owner: keep owner info when freeing the page (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).
- mm, page_owner: make init_pages_in_zone() faster (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).
- mm, page_owner: record page owner for each subpage (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).
- mm, page_owner: rename flag indicating that page is allocated (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).
- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).
- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).
- mm/memcontrol.c: fix use after free in mem_cgroup_iter() (bsc#1149224, VM Functionality).
- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).
- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).
- mmc: core: Fix init of SD cards reporting an invalid VDD range (bsc#1051510).
- mmc: core: fix wl1251 sdio quirks (git-fixes).
- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).
- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).
- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).
- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).
- mmc: sdhci-msm: fix mutex while in spinlock (bsc#1142635).
- mmc: sdhci-of-arasan: Do now show error message in case of deffered probe (bsc#1119086).
- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).
- mmc: sdhci-of-esdhc: Revert 'mmc: sdhci-of-esdhc: add erratum A-009204 support' (bsc#1051510).
- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).
- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).
- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).
- mmc: sdhci: improve ADMA error reporting (bsc#1051510).
- mmc: sdio: fix wl1251 vendor id (git-fixes).
- moduleparam: fix parameter description mismatch (bsc#1051510).
- mqprio: Fix out-of-bounds access in mqprio_dump (bsc#1109837).
- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).
- mt76x0: init hw capabilities.
- mtd: nand: mtk: fix incorrect register setting order about ecc irq.
- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI RCU Schedule Stall (bsc#1051510).
- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).
- mvpp2: refactor MTU change code (networking-stable-19_08_08).
- mwifex: free rx_cmd skb in suspended state (bsc#1111666).
- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).
- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).
- mwifiex: do no submit URB in suspended state (bsc#1111666).
- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).
- nbd: prevent memory leak (bsc#1158638).
- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).
- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).
- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).
- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).
- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).
- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).
- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).
- net/mlx4_en: Fix wrong limitation for number of TX rings (bsc#1103989).
- net/mlx4_en: fix a memory leak bug (bsc#1046299).
- net/mlx5: Accumulate levels for chains prio namespaces (bsc#1103990).
- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).
- net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).
- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).
- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).
- net/mlx5: Use reversed order when unregister devices (networking-stable-19_08_08).
- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).
- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).
- net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).
- net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).
- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).
- net/mlx5e: Only support tx/rx pause setting for port owner (networking-stable-19_08_21).
- net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990).
- net/mlx5e: Query global pause state before setting prio2buffer (bsc#1103990).
- net/mlx5e: Use flow keys dissector to parse packets for ARFS (networking-stable-19_08_21).
- net/packet: fix race in tpacket_snd() (networking-stable-19_08_21).
- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).
- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).
- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).
- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).
- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).
- net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).
- net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc#1109837).
- net/smc: Fix error path in smc_init (git-fixes).
- net/smc: avoid fallback in case of non-blocking connect (git-fixes).
- net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).
- net/smc: fix SMCD link group creation with VLAN id (git-fixes).
- net/smc: fix closing of fallback SMC sockets (git-fixes).
- net/smc: fix ethernet interface refcounting (git-fixes).
- net/smc: fix fastopen for non-blocking connect() (git-fixes).
- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).
- net/smc: fix refcounting for non-blocking connect() (git-fixes).
- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).
- net/smc: make sure EPOLLOUT is raised (networking-stable-19_08_28).
- net/smc: original socket family in inet_sock_diag (bsc#1149959).
- net: Fix null de-reference of device refcount (networking-stable-19_09_15).
- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).
- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).
- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).
- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).
- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).
- net: annotate accesses to sk->sk_incoming_cpu (networking-stable-19_11_05).
- net: annotate lockless accesses to sk->sk_napi_id (networking-stable-19_11_05).
- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).
- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).
- net: bcmgenet: Set phydev->dev_flags only for internal PHYs (networking-stable-19_10_24).
- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).
- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).
- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).
- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).
- net: dsa: fix switch tree list (networking-stable-19_11_05).
- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).
- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).
- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).
- net: fix ifindex collision during namespace removal (networking-stable-19_08_08).
- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).
- net: fix skb use after free in netpoll (networking-stable-19_09_05).
- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).
- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).
- net: hns3: Add missing newline at end of file (bsc#1104353 ).
- net: hns3: add Asym Pause support to fix autoneg problem (bsc#1104353).
- net: hns3: add a check to pointer in error_detected and slot_reset (bsc#1104353).
- net: hns3: add aRFS support for PF (bsc#1104353).
- net: hns3: add all IMP return code (bsc#1104353).
- net: hns3: add check to number of buffer descriptors (bsc#1104353).
- net: hns3: add default value for tc_size and tc_offset (bsc#1104353).
- net: hns3: add exception handling when enable NIC HW error interrupts (bsc#1104353).
- net: hns3: add handling of two bits in MAC tunnel interrupts (bsc#1104353).
- net: hns3: add handshake with hardware while doing reset (bsc#1104353).
- net: hns3: add opcode about query and clear RAS and MSI-X to special opcode (bsc#1104353).
- net: hns3: add recovery for the H/W errors occurred before the HNS dev initialization (bsc#1104353).
- net: hns3: add some error checking in hclge_tm module (bsc#1104353).
- net: hns3: add support for dump firmware statistics by debugfs (bsc#1104353).
- net: hns3: adjust hns3_uninit_phy()'s location in the hns3_client_uninit() (bsc#1104353).
- net: hns3: bitwise operator should use unsigned type (bsc#1104353).
- net: hns3: change GFP flag during lock period (bsc#1104353 ).
- net: hns3: change SSU's buffer allocation according to UM (bsc#1104353).
- net: hns3: check msg_data before memcpy in hclgevf_send_mbx_msg (bsc#1104353).
- net: hns3: clear restting state when initializing HW device (bsc#1104353).
- net: hns3: code optimizaition of hclge_handle_hw_ras_error() (bsc#1104353).
- net: hns3: delay and separate enabling of NIC and ROCE HW errors (bsc#1104353).
- net: hns3: delay ring buffer clearing during reset (bsc#1104353 ).
- net: hns3: delay setting of reset level for hw errors until slot_reset is called (bsc#1104353).
- net: hns3: delete the redundant user NIC codes (bsc#1104353 ).
- net: hns3: do not configure new VLAN ID into VF VLAN table when it's full (bsc#1104353).
- net: hns3: do not query unsupported commands in debugfs (bsc#1104353).
- net: hns3: enable DCB when TC num is one and pfc_en is non-zero (bsc#1104353).
- net: hns3: enable broadcast promisc mode when initializing VF (bsc#1104353).
- net: hns3: extract handling of mpf/pf msi-x errors into functions (bsc#1104353).
- net: hns3: fix ETS bandwidth validation bug (bsc#1104353 ).
- net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).
- net: hns3: fix VLAN filter restore issue after reset (bsc#1104353).
- net: hns3: fix __QUEUE_STATE_STACK_XOFF not cleared issue (bsc#1104353).
- net: hns3: fix a -Wformat-nonliteral compile warning (bsc#1104353).
- net: hns3: fix a memory leak issue for hclge_map_unmap_ring_to_vf_vector (bsc#1104353).
- net: hns3: fix a statistics issue about l3l4 checksum error (bsc#1104353).
- net: hns3: fix avoid unnecessary resetting for the H/W errors which do not require reset (bsc#1104353).
- net: hns3: fix compile warning without CONFIG_RFS_ACCEL (bsc#1104353).
- net: hns3: fix dereference of ae_dev before it is null checked (bsc#1104353).
- net: hns3: fix flow control configure issue for fibre port (bsc#1104353).
- net: hns3: fix for dereferencing before null checking (bsc#1104353).
- net: hns3: fix for skb leak when doing selftest (bsc#1104353 ).
- net: hns3: fix race conditions between reset and module loading and unloading (bsc#1104353).
- net: hns3: fix some coding style issues (bsc#1104353 ).
- net: hns3: fix some reset handshake issue (bsc#1104353 ).
- net: hns3: fix wrong size of mailbox responding data (bsc#1104353).
- net: hns3: fixes wrong place enabling ROCE HW error when loading (bsc#1104353).
- net: hns3: free irq when exit from abnormal branch (bsc#1104353 ).
- net: hns3: handle empty unknown interrupt (bsc#1104353 ).
- net: hns3: initialize CPU reverse mapping (bsc#1104353 ).
- net: hns3: log detail error info of ROCEE ECC and AXI errors (bsc#1104353).
- net: hns3: make HW GRO handling compliant with SW GRO (bsc#1104353).
- net: hns3: modify handling of out of memory in hclge_err.c (bsc#1104353).
- net: hns3: modify hclge_init_client_instance() (bsc#1104353 ).
- net: hns3: modify hclgevf_init_client_instance() (bsc#1104353 ).
- net: hns3: optimize the CSQ cmd error handling (bsc#1104353 ).
- net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).
- net: hns3: process H/W errors occurred before HNS dev initialization (bsc#1104353).
- net: hns3: re-schedule reset task while VF reset fail (bsc#1104353).
- net: hns3: refactor PF/VF RSS hash key configuration (bsc#1104353).
- net: hns3: refactor hns3_get_new_int_gl function (bsc#1104353 ).
- net: hns3: refine the flow director handle (bsc#1104353 ).
- net: hns3: remove RXD_VLD check in hns3_handle_bdinfo (bsc#1104353).
- net: hns3: remove VF VLAN filter entry inexistent warning print (bsc#1104353).
- net: hns3: remove override_pci_need_reset (bsc#1104353 ).
- net: hns3: remove redundant core reset (bsc#1104353 ).
- net: hns3: remove setting bit of reset_requests when handling mac tunnel interrupts (bsc#1104353).
- net: hns3: remove unused linkmode definition (bsc#1104353 ).
- net: hns3: replace numa_node_id with numa_mem_id for buffer reusing (bsc#1104353).
- net: hns3: set default value for param 'type' in hclgevf_bind_ring_to_vector (bsc#1104353).
- net: hns3: set maximum length to resp_data_len for exceptional case (bsc#1104353).
- net: hns3: set ops to null when unregister ad_dev (bsc#1104353 ).
- net: hns3: set the port shaper according to MAC speed (bsc#1104353).
- net: hns3: small changes for magic numbers (bsc#1104353 ).
- net: hns3: some changes of MSI-X bits in PPU(RCB) (bsc#1104353 ).
- net: hns3: some modifications to simplify and optimize code (bsc#1104353).
- net: hns3: some variable modification (bsc#1104353).
- net: hns3: stop schedule reset service while unloading driver (bsc#1104353).
- net: hns3: sync VLAN filter entries when kill VLAN ID failed (bsc#1104353).
- net: hns3: trigger VF reset if a VF had an over_8bd_nfe_err (bsc#1104353).
- net: hns3: typo in the name of a constant (bsc#1104353 ).
- net: hns3: use HCLGEVF_STATE_NIC_REGISTERED to indicate VF NIC client has registered (bsc#1104353).
- net: hns3: use HCLGE_STATE_NIC_REGISTERED to indicate PF NIC client has registered (bsc#1104353).
- net: hns3: use HCLGE_STATE_ROCE_REGISTERED to indicate PF ROCE client has registered (bsc#1104353).
- net: hns3: use macros instead of magic numbers (bsc#1104353 ).
- net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353).
- net: hns: add support for vlan TSO (bsc#1104353).
- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).
- net: phy: Check against net_device being NULL (bsc#1051510).
- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).
- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).
- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).
- net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).
- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).
- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).
- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).
- net: phy: marvell: clear wol event before setting it (bsc#1051510).
- net: phy: meson-gxl: check phy_write return value (bsc#1051510).
- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).
- net: phy: mscc: read 'vsc8531, edge-slowdown' as an u32 (bsc#1051510).
- net: phy: mscc: read 'vsc8531,vddmac' as an u32 (bsc#1051510).
- net: phy: xgene: disable clk on error paths (bsc#1051510).
- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).
- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).
- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).
- net: phylink: Fix flow control resolution (bsc#1119113 ).
- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).
- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).
- net: sched: Fix a possible null-pointer dereference in dequeue_func() (networking-stable-19_08_08).
- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).
- net: sched: cbs: Avoid division by zero when calculating the port rate (bsc#1109837).
- net: sched: ensure opts_len <= IP_TUNNEL_OPTS_MAX in act_tunnel_key (bsc#1109837).
- net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues (bsc#1109837).
- net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).
- net: sched: fix reordering issues (bsc#1109837).
- net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).
- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).
- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).
- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).
- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).
- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).
- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).
- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).
- net_sched: add policy validation for action attributes (networking-stable-19_09_30).
- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).
- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).
- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).
- nfc: netlink: fix double device reference drop (git-fixes).
- nfc: port100: handle command failure cleanly (git-fixes).
- nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).
- nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#1109837).
- nfsd: Do not release the callback slot unless it was actually held (git-fixes).
- nfsd: Fix overflow causing non-working mounts on 1 TB machines (bsc#1150381).
- nfsd: degraded slot-count more gracefully as allocation nears exhaustion (bsc#1150381).
- nfsd: fix performance-limiting session calculation (bsc#1150381).
- nfsd: give out fewer session slots as limit approaches (bsc#1150381).
- nfsd: handle drc over-allocation gracefully (bsc#1150381).
- nfsd: increase DRC cache limit (bsc#1150381).
- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).
- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).
- nl80211: fix null pointer dereference (bsc#1051510).
- null_blk: complete requests from ->timeout (bsc#1149446).
- null_blk: wire up timeouts (bsc#1149446).
- nvme-fc: fix module unloads while lports still pending (bsc#1150033).
- nvme-multipath: relax ANA state check (bsc#1123105).
- nvme-rdma: Allow DELETING state change failure in (bsc#1104967,).
- nvme-rdma: centralize admin/io queue teardown sequence (bsc#1142076).
- nvme-rdma: centralize controller setup sequence (bsc#1142076).
- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).
- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).
- nvme-rdma: fix timeout handler (bsc#1149446).
- nvme-rdma: fix timeout handler (bsc#1149446).
- nvme-rdma: remove redundant reference between ib_device and tagset (bsc#149446).
- nvme-rdma: stop admin queue before freeing it (bsc#1140155).
- nvme-rdma: support up to 4 segments of inline data (bsc#1142076).
- nvme-rdma: unquiesce queues when deleting the controller (bsc#1142076).
- nvme-rdma: use dynamic dma mapping per command (bsc#1149446).
- nvme-tcp: fix a NULL deref when an admin connect times out (bsc#1149446).
- nvme-tcp: fix timeout handler (bsc#1149446).
- nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).
- nvme: cancel request synchronously (bsc#1145661).
- nvme: do not abort completed request in nvme_cancel_request (bsc#1149446).
- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).
- nvme: remove ns sibling before clearing path (bsc#1140155).
- nvme: return BLK_EH_DONE from ->timeout (bsc#1142076).
- nvme: wait until all completed request's complete fn is called (bsc#1149446).
- nvmem: Use the same permissions for eeprom as for nvmem (git-fixes).
- objtool: Clobber user CFLAGS variable (bsc#1153236).
- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).
- ocfs2: fix passing zero to 'PTR_ERR' warning (bsc#1158649).
- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).
- openvswitch: fix flow command message size (git-fixes).
- pNFS/flexfiles: Turn off soft RPC calls (git-fixes).
- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).
- perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#1142924).
- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).
- phy: renesas: rcar-gen3-usb2: Disable clearing VBUS in over-current (bsc#1051510).
- phylink: fix kernel-doc warnings (bsc#1111666).
- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).
- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).
- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).
- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).
- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).
- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).
- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).
- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).
- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).
- pinctrl: sunxi: Fix a memory leak in 'sunxi_pinctrl_build_state()' (bsc#1051510).
- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).
- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).
- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).
- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).
- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).
- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).
- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).
- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).
- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).
- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).
- platform/x86: pmc_atom: Add Siemens SIMATIC IPC227E to critclk_systems DMI table (bsc#1051510).
- pnfs/flexfiles: Fix PTR_ERR() dereferences in ff_layout_track_ds_error (git-fixes).
- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).
- power: reset: gpio-restart: Fix typo when gpio reset is not found (bsc#1051510).
- power: supply: Init device wakeup after device_add() (bsc#1051510).
- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).
- power: supply: max14656: fix potential use-after-free (bsc#1051510).
- power: supply: sysfs: ratelimit property read error message (bsc#1051510).
- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).
- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).
- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).
- powerpc/64: Make sys_switch_endian() traceable (bsc#1065729).
- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).
- powerpc/64s/radix: Fix MADV_[FREE|DONTNEED] TLB flush miss problem with THP (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Fix memory hot-unplug page table split (bsc#1065729).
- powerpc/64s/radix: Fix memory hotplug section page table creation (bsc#1065729).
- powerpc/64s/radix: Implement _tlbie(l)_va_range flush functions (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Improve TLB flushing for page table freeing (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Improve preempt handling in TLB code (bsc#1152161 ltc#181664).
- powerpc/64s/radix: Introduce local single page ceiling for TLB range
- powerpc/64s/radix: Optimize flush_tlb_range (bsc#1152161 ltc#181664).
- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).
- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).
- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).
- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).
- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).
- powerpc/book3s64/mm: Do not do tlbie fixup for some hardware revisions (bsc#1152161 ltc#181664).
- powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flag (bsc#1152161 ltc#181664).
- powerpc/bpf: Fix tail call implementation (bsc#1157698).
- powerpc/bpf: use unsigned division instruction for 64-bit operations (bsc#1065729).
- powerpc/irq: Do not WARN continuously in arch_local_irq_restore() (bsc#1065729).
- powerpc/irq: drop arch_early_irq_init() (bsc#1065729).
- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).
- powerpc/mm/radix: Drop unneeded NULL check (bsc#1152161 ltc#181664).
- powerpc/mm/radix: implement LPID based TLB flushes to be used by KVM (bsc#1152161 ltc#181664).
- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).
- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).
- powerpc/mm: Fixup tlbie vs mtpidr/mtlpidr ordering issue on POWER9 (bsc#1152161 ltc#181664).
- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).
- powerpc/mm: Simplify page_is_ram by using memblock_is_memory (bsc#1065729).
- powerpc/mm: Use memblock API for PPC32 page_is_ram (bsc#1065729).
- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).
- powerpc/module64: Fix comment in R_PPC64_ENTRY handling (bsc#1065729).
- powerpc/powernv/ioda2: Allocate TCE table levels on demand for default DMA window (bsc#1061840).
- powerpc/powernv/ioda: Fix race in TCE level allocation (bsc#1061840).
- powerpc/powernv/npu: Remove obsolete comment about TCE_KILL_INVAL_ALL (bsc#1065729).
- powerpc/powernv: Disable native PCIe port management (bsc#1065729).
- powerpc/powernv: Fix compile without CONFIG_TRACEPOINTS (bsc#1065729).
- powerpc/powernv: Flush console before platform error reboot (bsc#1149940 ltc#179958).
- powerpc/powernv: Restrict OPAL symbol map to only be readable by root (bsc#1152885).
- powerpc/powernv: Use k